• Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About Darknet
  • Hacking Tools
  • Popular Posts
  • Darknet Archives
  • Contact Darknet
    • Advertise
    • Submit a Tool
Darknet – Hacking Tools, Hacker News & Cyber Security

Darknet - Hacking Tools, Hacker News & Cyber Security

Darknet is your best source for the latest hacking tools, hacker news, cyber security best practices, ethical hacking & pen-testing.

Proof of Concept for Internet Explorer Modal Dialog Exploit

May 2, 2006

Views: 6,880

[ad]

Pretty interesting and imaginative way to exploit the flaw in IE…yeah I know linked to ActiveX again, all the more reason to use Firefox right?

It just shows that the browser really is a point of entry, this could be useful for a penetration test, another way to show how easy it is to get in via internet explorer, the frequency with which IE exploits have been coming out recently is scarier than normal.

A particular scenario was identified that involved the exploitation of the modal ActiveX prompt delivered by some systems. The user is asked to type a certain string of characters (ala captcha). A prompt will be displayed (hopefully during the time the user is typing the string) to install the Microsoft Surround Video Control.

If you’re still typing the “captcha” when the prompt appears, you’ll install the control. This works as advertised against all systems EXCEPT Windows XP SP2 and Windows Server 2003 SP1. If the software you install hoses your box, just remember that it’s signed by Microsoft. In
other words… don’t look at me.

You can check the PoC here:

Proof of Concept for IE Modal Dialog Issue

It just crashes IE for me, I’m not sure if it’s a null pointer or what, but I’m sure there’s some way to exploit it to take over the machine, it’s a another vulnerability, which usually can be mashed together with a couple of others to get complete control.

By Matthew Murphy spotted on Vulnwatch

Share
Tweet
Share
Buffer
WhatsApp
Email
0 Shares

Filed Under: Exploits/Vulnerabilities, Windows Hacking Tagged With: exploit, IE-exploit, internet-exploder, internet-explorer-exploit, vulnerability



Reader Interactions

Comments

  1. mozzy says

    May 2, 2006 at 12:20 pm

    Hey there,
    Well I am not a fan of IE either but dude….c’mon “This works as advertised against all systems EXCEPT Windows XP SP2 and Windows Server 2003 SP1.”

    Don’t you think that all earlier versions of browsers (systems) have flaws that you could test around with if not the needed updates are installed? Which user in the right mind does not have XP SP2 on the machine (if he installed windows at all).

    However, I enjoy reading your blog…lots of interesting and funny stuff here. This was the only post that kept me thinking that it is kinda wrong ;)

    It is like stabbing in open wounds xD

  2. Darknet says

    May 2, 2006 at 5:05 pm

    mozzy: Well I’m still still using Windows 2000 as are a lot of people I know as we MUCH prefer it to Windows XP (raw sockets pls?)

    And I know quite a lot of people with older computers running Windows98, not everyone can afford the latest hardware.

    So I’m pretty sure it still effects a significantly large demographic, and it crashed my IE on XP SP2 anyway..

    Sorry to be outdated ;)

  3. mozzy says

    May 3, 2006 at 6:03 am

    he he
    well… don’t know what to say…
    would you run a red hat version without neccessary security updates?

    i wouldn’t thought so…

    but you’re right. It bothers me too that XP requires quiet some hardware (though i was running XP SP 2 on a Celeron 2.4 with 128 RAM without severe problem thanks to the ability to disable all styles and animations)

    but what is really interesting is that it crashed IE with you on XP SP2 though the article says that it is not affected…are you maybe missing updates?

    anyway…
    I am going to make my own system…with black jack and hookers :P

    however about the Raw sockets issue i found you two very interesting articles :)

    http://grcsucks.com/mirror/SocketToMe.htm
    Talks about how to fix this issue in XP AND 200 ;)

    http://grc.com/dos/xpconference.htm
    Talks about how microsoft does not really care about these issues xD

    The later article is interesting butnot really useful whereas the first one helps you to secure your system (if don’t know already ;) )

    sorry for double posting…
    but i just found this one regarding raw sockets

    http://grc.com/dos/
    The article wit the title “Microsoft Removes Raw Sockets from XP”

    Updates, updates, updates…

    ;)

  4. Darknet says

    May 3, 2006 at 6:24 am

    Well my Win2k is fully up to date..as up to date as it can be anyway.

    A Celeron 2.4 is a very powerful machine relatively…I’m talking about those computers like Pentium II 333mhz. How can those run Windows XP?

    And yes people are still using such machines.

    Yah I’m pretty sure the XP SP2 has all updates, as it even has the stupid Genuine Advantage thing installed, which was only last week.

    Try not to quote GRC.com if you can, most people in the security industry think Steve Gibson is a raving lunatic ;)

    He does have some good coverage on the raw sockets issue though. But why hack the OS to give back some functionality you shouldn’t have lost in the first place?

    Luckily the new nmap compensates the problem with the ability to send Ethernet frames.

  5. mozzy says

    May 3, 2006 at 6:33 am

    Maybe this one helps for those who would like to run XP on a “weak” machine :)

    http://www.winhistory.de/more/386/xpmini_eng.htm

Primary Sidebar

Search Darknet

  • Email
  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Advertise on Darknet

Latest Posts

Best Open Source HIDS Tools for Linux in 2025 (Compared & Ranked)

Views: 418

With more businesses running Linux in production—whether in bare metal, VMs, or containers—the need … ...More about Best Open Source HIDS Tools for Linux in 2025 (Compared & Ranked)

SUDO_KILLER - Auditing Sudo Configurations for Privilege Escalation Paths

SUDO_KILLER – Auditing Sudo Configurations for Privilege Escalation Paths

Views: 467

sudo is a powerful utility in Unix-like systems that allows permitted users to execute commands with … ...More about SUDO_KILLER – Auditing Sudo Configurations for Privilege Escalation Paths

Bantam - Advanced PHP Backdoor Management Tool For Post Exploitation

Bantam – Advanced PHP Backdoor Management Tool For Post Exploitation

Views: 386

Bantam is a lightweight post-exploitation utility written in C# that includes advanced payload … ...More about Bantam – Advanced PHP Backdoor Management Tool For Post Exploitation

AI-Powered Cybercrime in 2025 - The Dark Web’s New Arms Race

AI-Powered Cybercrime in 2025 – The Dark Web’s New Arms Race

Views: 588

In 2025, the dark web isn't just a marketplace for illicit goods—it's a development lab. … ...More about AI-Powered Cybercrime in 2025 – The Dark Web’s New Arms Race

Upload_Bypass - Bypass Upload Restrictions During Penetration Testing

Upload_Bypass – Bypass Upload Restrictions During Penetration Testing

Views: 556

Upload_Bypass is a command-line tool that automates discovering and exploiting weak file upload … ...More about Upload_Bypass – Bypass Upload Restrictions During Penetration Testing

Shell3r - Powerful Shellcode Obfuscator for Offensive Security

Shell3r – Powerful Shellcode Obfuscator for Offensive Security

Views: 726

If antivirus and EDR vendors are getting smarter, so are the tools that red teamers and penetration … ...More about Shell3r – Powerful Shellcode Obfuscator for Offensive Security

Topics

  • Advertorial (28)
  • Apple (46)
  • Countermeasures (228)
  • Cryptography (82)
  • Database Hacking (89)
  • Events/Cons (7)
  • Exploits/Vulnerabilities (431)
  • Forensics (65)
  • GenAI (3)
  • Hacker Culture (8)
  • Hacking News (229)
  • Hacking Tools (684)
  • Hardware Hacking (82)
  • Legal Issues (179)
  • Linux Hacking (74)
  • Malware (238)
  • Networking Hacking Tools (352)
  • Password Cracking Tools (104)
  • Phishing (41)
  • Privacy (219)
  • Secure Coding (118)
  • Security Software (233)
  • Site News (51)
    • Authors (6)
  • Social Engineering (37)
  • Spammers & Scammers (76)
  • Stupid E-mails (6)
  • Telecomms Hacking (6)
  • UNIX Hacking (6)
  • Virology (6)
  • Web Hacking (384)
  • Windows Hacking (169)
  • Wireless Hacking (45)

Security Blogs

  • Dancho Danchev
  • F-Secure Weblog
  • Google Online Security
  • Graham Cluley
  • Internet Storm Center
  • Krebs on Security
  • Schneier on Security
  • TaoSecurity
  • Troy Hunt

Security Links

  • Exploits Database
  • Linux Security
  • Register – Security
  • SANS
  • Sec Lists
  • US CERT

Footer

Most Viewed Posts

  • Brutus Password Cracker – Download brutus-aet2.zip AET2 (2,294,320)
  • Darknet – Hacking Tools, Hacker News & Cyber Security (2,173,085)
  • Top 15 Security Utilities & Download Hacking Tools (2,096,621)
  • 10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery) (1,199,681)
  • Password List Download Best Word List – Most Common Passwords (933,487)
  • wwwhack 1.9 – wwwhack19.zip Web Hacking Software Free Download (776,146)
  • Hack Tools/Exploits (673,293)
  • Wep0ff – Wireless WEP Key Cracker Tool (530,157)

Search

Recent Posts

  • Best Open Source HIDS Tools for Linux in 2025 (Compared & Ranked) May 14, 2025
  • SUDO_KILLER – Auditing Sudo Configurations for Privilege Escalation Paths May 12, 2025
  • Bantam – Advanced PHP Backdoor Management Tool For Post Exploitation May 9, 2025
  • AI-Powered Cybercrime in 2025 – The Dark Web’s New Arms Race May 7, 2025
  • Upload_Bypass – Bypass Upload Restrictions During Penetration Testing May 5, 2025
  • Shell3r – Powerful Shellcode Obfuscator for Offensive Security May 2, 2025

Tags

apple botnets computer-security darknet Database Hacking ddos dos exploits fuzzing google hacking-networks hacking-websites hacking-windows hacking tool Information-Security information gathering Legal Issues malware microsoft network-security Network Hacking Password Cracking pen-testing penetration-testing Phishing Privacy Python scammers Security Security Software spam spammers sql-injection trojan trojans virus viruses vulnerabilities web-application-security web-security windows windows-security Windows Hacking worms XSS

Copyright © 1999–2025 Darknet All Rights Reserved · Privacy Policy