Latest YouTube Video

Saturday, February 7, 2015

Re: [FD] Major Internet Explorer Vulnerability - NOT Patched

'could you share the contents of "1.php"?' Sure: "I'm assuming it is a delayed re-direct to the target's domain?" Exactly. :-) "the cloudflare scripts" It's been tested without them. Kind Regards, On 2015/2/6 2:31, Barkley, Peter wrote: > Thanks Zaakiy, > > I'm able to get the hacked page on IE9 after changing the document mode from Quirks to IE9 Standards. Screenshot attached. I'm sure you could get around having to manually switch the document mode with the appropriate DOCTYPE set in the exploit html page. > > David, could you share the contents of "1.php"? I'm assuming it is a delayed re-direct to the target's domain? I am unable to reproduce the exploit locally with the same code (assuming my 1.php is correct), though without the cloudflare scripts. > > Thanks, > Peter > > > Peter Barkley | Senior Security Intelligence Analyst | Security Operations Centre | Royal Bank of Canada > > > >



Source: Gmail -> IFTTT-> Blogger

No comments: