• Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About Darknet
  • Hacking Tools
  • Popular Posts
  • Darknet Archives
  • Contact Darknet
    • Advertise
    • Submit a Tool
Darknet – Hacking Tools, Hacker News & Cyber Security

Darknet - Hacking Tools, Hacker News & Cyber Security

Darknet is your best source for the latest hacking tools, hacker news, cyber security best practices, ethical hacking & pen-testing.

Proof of Concept for Internet Explorer Modal Dialog Exploit

May 2, 2006

Views: 6,898

[ad]

Pretty interesting and imaginative way to exploit the flaw in IE…yeah I know linked to ActiveX again, all the more reason to use Firefox right?

It just shows that the browser really is a point of entry, this could be useful for a penetration test, another way to show how easy it is to get in via internet explorer, the frequency with which IE exploits have been coming out recently is scarier than normal.

A particular scenario was identified that involved the exploitation of the modal ActiveX prompt delivered by some systems. The user is asked to type a certain string of characters (ala captcha). A prompt will be displayed (hopefully during the time the user is typing the string) to install the Microsoft Surround Video Control.

If you’re still typing the “captcha” when the prompt appears, you’ll install the control. This works as advertised against all systems EXCEPT Windows XP SP2 and Windows Server 2003 SP1. If the software you install hoses your box, just remember that it’s signed by Microsoft. In
other words… don’t look at me.

You can check the PoC here:

Proof of Concept for IE Modal Dialog Issue

It just crashes IE for me, I’m not sure if it’s a null pointer or what, but I’m sure there’s some way to exploit it to take over the machine, it’s a another vulnerability, which usually can be mashed together with a couple of others to get complete control.

By Matthew Murphy spotted on Vulnwatch

Related Posts:

  • LLM Black Markets in 2025 - Prompt Injection,…
  • An Introduction To Web Application Security Systems
  • What You Need To Know About KRACK WPA2 Wi-Fi Attack
  • Privacy Implications of Web 3.0 and Darknets
  • nbtscan Download - NetBIOS Scanner For Windows & Linux
  • SetupHijack - Installer and Updater Race Condition…
Share
Tweet
Share
Buffer
WhatsApp
Email

Filed Under: Exploits/Vulnerabilities, Windows Hacking Tagged With: exploit, IE-exploit, internet-exploder, internet-explorer-exploit, vulnerability



Reader Interactions

Comments

  1. mozzy says

    May 2, 2006 at 12:20 pm

    Hey there,
    Well I am not a fan of IE either but dude….c’mon “This works as advertised against all systems EXCEPT Windows XP SP2 and Windows Server 2003 SP1.”

    Don’t you think that all earlier versions of browsers (systems) have flaws that you could test around with if not the needed updates are installed? Which user in the right mind does not have XP SP2 on the machine (if he installed windows at all).

    However, I enjoy reading your blog…lots of interesting and funny stuff here. This was the only post that kept me thinking that it is kinda wrong ;)

    It is like stabbing in open wounds xD

  2. Darknet says

    May 2, 2006 at 5:05 pm

    mozzy: Well I’m still still using Windows 2000 as are a lot of people I know as we MUCH prefer it to Windows XP (raw sockets pls?)

    And I know quite a lot of people with older computers running Windows98, not everyone can afford the latest hardware.

    So I’m pretty sure it still effects a significantly large demographic, and it crashed my IE on XP SP2 anyway..

    Sorry to be outdated ;)

  3. mozzy says

    May 3, 2006 at 6:03 am

    he he
    well… don’t know what to say…
    would you run a red hat version without neccessary security updates?

    i wouldn’t thought so…

    but you’re right. It bothers me too that XP requires quiet some hardware (though i was running XP SP 2 on a Celeron 2.4 with 128 RAM without severe problem thanks to the ability to disable all styles and animations)

    but what is really interesting is that it crashed IE with you on XP SP2 though the article says that it is not affected…are you maybe missing updates?

    anyway…
    I am going to make my own system…with black jack and hookers :P

    however about the Raw sockets issue i found you two very interesting articles :)

    http://grcsucks.com/mirror/SocketToMe.htm
    Talks about how to fix this issue in XP AND 200 ;)

    http://grc.com/dos/xpconference.htm
    Talks about how microsoft does not really care about these issues xD

    The later article is interesting butnot really useful whereas the first one helps you to secure your system (if don’t know already ;) )

    sorry for double posting…
    but i just found this one regarding raw sockets

    http://grc.com/dos/
    The article wit the title “Microsoft Removes Raw Sockets from XP”

    Updates, updates, updates…

    ;)

  4. Darknet says

    May 3, 2006 at 6:24 am

    Well my Win2k is fully up to date..as up to date as it can be anyway.

    A Celeron 2.4 is a very powerful machine relatively…I’m talking about those computers like Pentium II 333mhz. How can those run Windows XP?

    And yes people are still using such machines.

    Yah I’m pretty sure the XP SP2 has all updates, as it even has the stupid Genuine Advantage thing installed, which was only last week.

    Try not to quote GRC.com if you can, most people in the security industry think Steve Gibson is a raving lunatic ;)

    He does have some good coverage on the raw sockets issue though. But why hack the OS to give back some functionality you shouldn’t have lost in the first place?

    Luckily the new nmap compensates the problem with the ability to send Ethernet frames.

  5. mozzy says

    May 3, 2006 at 6:33 am

    Maybe this one helps for those who would like to run XP on a “weak” machine :)

    http://www.winhistory.de/more/386/xpmini_eng.htm

Primary Sidebar

Search Darknet

  • Email
  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Advertise on Darknet

Latest Posts

Reconnoitre - Open-Source Reconnaissance and Service Enumeration Tool

Reconnoitre – Open-Source Reconnaissance and Service Enumeration Tool

Views: 308

Reconnoitre is an open-source reconnaissance tool that automates multithreaded information gathering … ...More about Reconnoitre – Open-Source Reconnaissance and Service Enumeration Tool

Scanners-Box - Open-Source Reconnaissance and Scanning Toolkit

Scanners-Box – Open-Source Reconnaissance and Scanning Toolkit

Views: 484

Scanners-Box is an open-source, community-curated collection of scanners and reconnaissance … ...More about Scanners-Box – Open-Source Reconnaissance and Scanning Toolkit

Red Teaming LLMs 2025 - Offensive Security Meets Generative AI

Red Teaming LLMs 2025 – Offensive Security Meets Generative AI

Views: 517

As enterprises deploy large language models (LLMs) at scale, the offensive security discipline of … ...More about Red Teaming LLMs 2025 – Offensive Security Meets Generative AI

gitlab-runner-research - PoC for abusing self-hosted GitLab runners

gitlab-runner-research – PoC for abusing self-hosted GitLab runners

Views: 337

gitlab-runner-research is a proof-of-concept repository and write-up that demonstrates how attackers … ...More about gitlab-runner-research – PoC for abusing self-hosted GitLab runners

mcp-scanner - Python MCP Scanner for Prompt-Injection and Insecure Agents

mcp-scanner – Python MCP Scanner for Prompt-Injection and Insecure Agents

Views: 584

mcp-scanner is an open-source Python tool that scans Model Context Protocol (MCP) servers and agent … ...More about mcp-scanner – Python MCP Scanner for Prompt-Injection and Insecure Agents

Deepfake-as-a-Service 2025 - How Voice Cloning and Synthetic Media Fraud Are Changing Enterprise Defenses

Deepfake-as-a-Service 2025 – How Voice Cloning and Synthetic Media Fraud Are Changing Enterprise Defenses

Views: 671

Deepfake operations have matured into a commercial model that attackers package as … ...More about Deepfake-as-a-Service 2025 – How Voice Cloning and Synthetic Media Fraud Are Changing Enterprise Defenses

Topics

  • Advertorial (28)
  • Apple (46)
  • Cloud Security (8)
  • Countermeasures (231)
  • Cryptography (85)
  • Dark Web (4)
  • Database Hacking (89)
  • Events/Cons (7)
  • Exploits/Vulnerabilities (433)
  • Forensics (64)
  • GenAI (12)
  • Hacker Culture (10)
  • Hacking News (236)
  • Hacking Tools (708)
  • Hardware Hacking (82)
  • Legal Issues (179)
  • Linux Hacking (74)
  • Malware (241)
  • Networking Hacking Tools (352)
  • Password Cracking Tools (107)
  • Phishing (41)
  • Privacy (219)
  • Secure Coding (119)
  • Security Software (235)
  • Site News (51)
    • Authors (6)
  • Social Engineering (37)
  • Spammers & Scammers (76)
  • Stupid E-mails (6)
  • Telecomms Hacking (6)
  • UNIX Hacking (6)
  • Virology (6)
  • Web Hacking (384)
  • Windows Hacking (171)
  • Wireless Hacking (45)

Security Blogs

  • Dancho Danchev
  • F-Secure Weblog
  • Google Online Security
  • Graham Cluley
  • Internet Storm Center
  • Krebs on Security
  • Schneier on Security
  • TaoSecurity
  • Troy Hunt

Security Links

  • Exploits Database
  • Linux Security
  • Register – Security
  • SANS
  • Sec Lists
  • US CERT

Footer

Most Viewed Posts

  • Brutus Password Cracker Hacker – Download brutus-aet2.zip AET2 (2,394,948)
  • Darknet – Hacking Tools, Hacker News & Cyber Security (2,173,814)
  • Top 15 Security Utilities & Download Hacking Tools (2,097,292)
  • 10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery) (1,200,141)
  • Password List Download Best Word List – Most Common Passwords (934,345)
  • wwwhack 1.9 – wwwhack19.zip Web Hacking Software Free Download (777,066)
  • Hack Tools/Exploits (673,983)
  • Wep0ff – Wireless WEP Key Cracker Tool (531,051)

Search

Recent Posts

  • Reconnoitre – Open-Source Reconnaissance and Service Enumeration Tool November 10, 2025
  • Scanners-Box – Open-Source Reconnaissance and Scanning Toolkit November 7, 2025
  • Red Teaming LLMs 2025 – Offensive Security Meets Generative AI November 5, 2025
  • gitlab-runner-research – PoC for abusing self-hosted GitLab runners November 3, 2025
  • mcp-scanner – Python MCP Scanner for Prompt-Injection and Insecure Agents October 31, 2025
  • Deepfake-as-a-Service 2025 – How Voice Cloning and Synthetic Media Fraud Are Changing Enterprise Defenses October 29, 2025

Tags

apple botnets computer-security darknet Database Hacking ddos dos exploits fuzzing google hacking-networks hacking-websites hacking-windows hacking tool Information-Security information gathering Legal Issues malware microsoft network-security Network Hacking Password Cracking pen-testing penetration-testing Phishing Privacy Python scammers Security Security Software spam spammers sql-injection trojan trojans virus viruses vulnerabilities web-application-security web-security windows windows-security Windows Hacking worms XSS

Copyright © 1999–2025 Darknet All Rights Reserved · Privacy Policy