Pwn2Own 2010 Windows 7 Internet Explorer 8 exploit
Page 1 of 1
Pwn2Own 2010 Windows 7 Internet Explorer 8 exploit
The exploit consists of two parts.
The first part figures out where a certain .dll file is loaded in the current process followed by step 2 that uses the information gathered in step 1 to trigger an exploit that uses some ret2lib technique to disable DEP for our shellcode and then redirects the program flow to the shellcode.
Download PDF
The first part figures out where a certain .dll file is loaded in the current process followed by step 2 that uses the information gathered in step 1 to trigger an exploit that uses some ret2lib technique to disable DEP for our shellcode and then redirects the program flow to the shellcode.
Download PDF
andry- Moderator
- Posts : 467
Join date : 2010-05-07
Similar topics
» 0day Internet Explorer Exploit Released
» Windows XP Internet Explorer 8,7 .HLP vulnerability
» Windows Vista/7 : SMB2.0 NEGOTIATE PROTOCOL REQUEST Remote B.S.O.D. Exploit
» Internet Explorer considered harmful
» Abusing Internet Explorer 8's XSS Filters
» Windows XP Internet Explorer 8,7 .HLP vulnerability
» Windows Vista/7 : SMB2.0 NEGOTIATE PROTOCOL REQUEST Remote B.S.O.D. Exploit
» Internet Explorer considered harmful
» Abusing Internet Explorer 8's XSS Filters
Page 1 of 1
Permissions in this forum:
You cannot reply to topics in this forum
|
|