FileHack
Copyright © MegaSecurity
By akosch
Informations
From | Germany |
Author | akosch |
Family | FileHack |
Category | Remote Access |
Version | FileHack |
Language | Delphi |
Additional Information
Client:
port: 1986, 2004 TCP
Server: Server.html
remark:
Used method:
Microsoft Internet Explorer (unpatched) contains a vulnerability that can allow script code
within an HTML document to run an embedded executable file. Since the file is an HTML file,
Internet Explorer will open and parse the file. When the script that points back
to the embedded executable is parsed, the embedded executable will run on the client
system in the security context of Internet Explorer.
(Securityfocus)
If you recognize any personal information on this page and wish to have it removed or redacted, please contact us at jplesueur@phrozen.io. We are committed to protecting your privacy in accordance with GDPR regulations.