Penetration Testing mailing list archives

Re: ActiveX


From: jerome.athias () free fr
Date: 6 Sep 2005 09:44:44 -0000

Starting with the 2.4 release, the Metasploit Framework can be used to load arbitrary ActiveX controls into a target 
process. This feature works by patching the registry of the target system and causing the exploited process to launch 
internet explorer with a URL pointing back to the Framework. The Framework starts up a simple web server that accepts 
the request and sends back a web page instructing it to load an ActiveX component. The exploited system then downloads, 
registers, and executes the ActiveX.

http://www.metasploit.com/projects/Framework/docs/userguide/node46.html


------------------------------------------------------------------------------
Audit your website security with Acunetix Web Vulnerability Scanner: 

Hackers are concentrating their efforts on attacking applications on your 
website. Up to 75% of cyber attacks are launched on shopping carts, forms, 
login pages, dynamic content etc. Firewalls, SSL and locked-down servers are 
futile against web application hacking. Check your website for vulnerabilities 
to SQL injection, Cross site scripting and other web attacks before hackers do! 
Download Trial at:

http://www.securityfocus.com/sponsor/pen-test_050831
-------------------------------------------------------------------------------


Current thread: