Thread Closed
[ASK] Explot facebook untuk apa?
#1
exploit browser ini gunanya untuk apa? ada tulisan facebook
jadi tertarik cobaBig Grin
Quote:U modules/exploits/windows/browser/facebook_extractiptc.rb
root@IBTeam# loe.gw ^C

#2
Description This module exploits a stack buffer overflow in Facebook Photo Uploader 4. By sending an overly long string to the "ExtractIptc()" property located in the ImageUploader4.ocx (4.5.57.0) Control, an attacker may be able to execute arbitrary code. References:
CVE: 2008-5711
OSVDB: 41073
BID: 27534
URL: http://milw0rm.com/exploits/5049

Authors : MC
License : Metasploit Framework License (BSD)
Version : 12540

TARGET : IE 6 SP0-SP2 / Windows XP SP2 Pro English


#3
(08-28-2011, 04:29 PM)james0baster Wrote: Description This module exploits a stack buffer overflow in Facebook Photo Uploader 4. By sending an overly long string to the "ExtractIptc()" property located in the ImageUploader4.ocx (4.5.57.0) Control, an attacker may be able to execute arbitrary code. References:
CVE: 2008-5711
OSVDB: 41073
BID: 27534
URL: http://milw0rm.com/exploits/5049

Authors : MC
License : Metasploit Framework License (BSD)
Version : 12540

TARGET : IE 6 SP0-SP2 / Windows XP SP2 Pro English

jadi intinya ini membuat stack ketika upload foto gt?Rolleyes
wah hanya IE 6 rupanya Rolleyes
root@IBTeam# loe.gw ^C

#4
(08-28-2011, 04:51 PM)c0d3HitLER Wrote:
(08-28-2011, 04:29 PM)james0baster Wrote: Description This module exploits a stack buffer overflow in Facebook Photo Uploader 4. By sending an overly long string to the "ExtractIptc()" property located in the ImageUploader4.ocx (4.5.57.0) Control, an attacker may be able to execute arbitrary code. References:
CVE: 2008-5711
OSVDB: 41073
BID: 27534
URL: http://milw0rm.com/exploits/5049

Authors : MC
License : Metasploit Framework License (BSD)
Version : 12540

TARGET : IE 6 SP0-SP2 / Windows XP SP2 Pro English

jadi intinya ini membuat stack ketika upload foto gt?Rolleyes
wah hanya IE 6 rupanya Rolleyes

bukan stak, coba pake aja, bisa ngaktifkan session Big Grin
jadi tinggal tergantung mau gunain payload apa :pc:

meterpreter juga jalan Rolleyes

yah susahnya kan jarang yg make tuh IE sekarang ini =))

#5
(08-28-2011, 06:08 PM)james0baster Wrote:
(08-28-2011, 04:51 PM)c0d3HitLER Wrote:
(08-28-2011, 04:29 PM)james0baster Wrote: Description This module exploits a stack buffer overflow in Facebook Photo Uploader 4. By sending an overly long string to the "ExtractIptc()" property located in the ImageUploader4.ocx (4.5.57.0) Control, an attacker may be able to execute arbitrary code. References:
CVE: 2008-5711
OSVDB: 41073
BID: 27534
URL: http://milw0rm.com/exploits/5049

Authors : MC
License : Metasploit Framework License (BSD)
Version : 12540

TARGET : IE 6 SP0-SP2 / Windows XP SP2 Pro English

jadi intinya ini membuat stack ketika upload foto gt?Rolleyes
wah hanya IE 6 rupanya Rolleyes

bukan stak, coba pake aja, bisa ngaktifkan session Big Grin
jadi tinggal tergantung mau gunain payload apa :pc:

meterpreter juga jalan Rolleyes

yah susahnya kan jarang yg make tuh IE sekarang ini =))

iya sih
susah jg cari korban
untuk percobaan sendiri paling kga komputer musti dobel
atu buat ini
atu lagi bwt run IE=))
gampang lah

korban realnya itu yang susah
ngajakin temen yg bego aja kali ye bwt dikadalin=))
iming" hotspot gratisanRolleyes
root@IBTeam# loe.gw ^C

#6
Jempol kaki musti nerobos wilayah pinggiran neh bwt cari IE user Smile

Ih ogah
Threadnya boleh dilock kalo udh selesai Smile
root@IBTeam# loe.gw ^C


Thread Closed



Users browsing this thread: 1 Guest(s)