Informative Information for the Uninformed
Current
v9
v8
v7
v6
v5
v4
v3
v2
v1
All
About
Vol all
»
Archive
Next:
Contents
Post-Exploitation on Windows using ActiveX Controls
skape
mmiller@hick.org
Last modified:
03/18/2005
Contents
Foreword
Introduction
Implementation: PassiveX
The ActiveX Injection Payload
HTTP Tunneling ActiveX Control
Potential Uses and Enhancements
Automation with Scripting
Passive Information Gathering
Penetration Testing
Worm Propagation
Methods of Prevention
Heuristic based filtering
Improving application-based filters
Conclusion
Bibliography
About this document ...