TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Cookiejacking: 0-day exploit of all Internet Explorer versions

171 点作者 jpadvo将近 14 年前

5 条评论

tptacek将近 14 年前
I mean, this is clever and all, but what am I missing? Isn't this just an IE bug? That you can access cookie files as IFRAME targets? Is there some part of the IE architecture that <i>depends</i> on that functionality, or is Microsoft just going to patch that?<p>Because pretty much all the browsers, on a better-than-quarterly basis, fall victim to attacks that allow arbitrary web pages to <i>upload code into their processes and run it</i>.<p>Just not sure this needed the "attack class" name.
评论 #2597548 未加载
评论 #2597497 未加载
评论 #2597522 未加载
评论 #2597591 未加载
pluies_public将近 14 年前
Apparently that page has been shut down by Google?<p>"This site has been disabled for violations of our Terms of Service. If you feel this disabling was in error, please fill out our appeal form."
评论 #2599318 未加载
trotsky将近 14 年前
Novel approach, but I'm curious how many networks let 445 smb over tcp out? Enterprise networks sure shouldn't, my office doesn't, my house doesn't though admittedly most people won't be configured this way. But don't big carriers like comcast also filter common microsoft ports like this and 139 because of worm and exploit activity?
评论 #2597740 未加载
cppsnob将近 14 年前
Can someone describe the white hat credo with respect to 0 day exploits?<p>Did he give Microsoft a head's up about these and a chance to respond before going public? Or does he just give a conference talk and post it to his blog, potentially providing the information allowing thousands of browsers to get compromised (assuming they weren't already) before privately letting Microsoft get a chance to patch it?
评论 #2597763 未加载
dopechemical将近 14 年前
If this attack involves "simply sniffing TCP 445" why not just MITM the whole session?<p>The state of security is becoming an over-hyped sideshow of late where the most trivial attacks, which would work maybe 1% of the time in the wild, are getting mass exposure.<p>I have a 0day in RHEL 5, you simply need to log onto the machine as root and run this script...
评论 #2598061 未加载
评论 #2598104 未加载