Tunneling Shellcode with ActiveX 11
hdm writes "In the first issue of the Uninformed Journal, skape
describes a method
for using ActiveX as a transport mechanism for shellcode. The implementation, dubbed 'PassiveX', can be used to tunnel an
interactive command shell or
full VNC session
over the HTTP protocol. PassiveX takes advantage of the Internet Explorer settings to pass through web proxies and escape restrictive outbound firewalls."
Old news, but nice explanation. (Score:3, Interesting)
Tunneling other protocols through HTTP is certainly nothing new, and hackers have been using the technology to establish secure communications channels with compromised machines through firewalls as long as the technique has been around.
That being said, I was impressed with the in-depth coverage of this particular type of exploit. A fascinating read...www.uninformed.org is definitely bookmarked.
Something usefull (Score:1)
www.uninformed.org? (Score:2)
Re:www.uninformed.org? (Score:1)
Interesting, but not all that new. (Score:1)
This paper appears to document the same basic problem, and is strictly a difference of degree, not kind.
Feature or Bug? (Score:1)
Is there really any need (Score:1)