Announcement

Collapse
No announcement yet.

Html Trojans

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • #16
    Originally posted by blackwave
    well the idea is that if XP becomes infected, you can't really trust it can you? Booting off a disk and loading ghost or drive image works out better this way.

    also with windows xp let us not forget the WPA (windows product activation) - it is a real bitch as I have encountered with even just swapping drives from one identical laptop to another... wpa barfs upon load and of course it is a legit copy, which you must have if your machines go through software auditing.

    XP pro does not suffer from the activation problems.

    I've got 200 machines with the same code... (and yes, this is legal, we have a site licence, no pirating here folks)
    --Shatter

    "People demand freedom of speech to make up for the freedom of thought which they avoid."
    - Soren Aabye Kierkegaard (1813-1855)

    Comment


    • #17
      The site license when used with the MS Subscription CDs work just fine. Don't try to buy a version from the shelp at a computer store and expect it to NOT wanna phone home.

      Comment


      • #18
        Originally posted by Shatter
        No no. You're missing the operation.
        ...My only real problem is wen the stupid n00b user decides to delete the contents of D: cause there's not enough room for his personal shit (games, mp3's, etc.
        oooo....okay...I thought we were talking about the same machines here, and even if they were I think there might be hardware diffs when you clone...but that's not the point of my reply. Can't you just hide your partition of D:, or if it's NTFS, just set the permissions so the user can't access it, that would save you a lot of trouble.
        Where's the dedication?

        Comment


        • #19
          Originally posted by TwinVega
          oooo....okay...I thought we were talking about the same machines here, and even if they were I think there might be hardware diffs when you clone...but that's not the point of my reply. Can't you just hide your partition of D:, or if it's NTFS, just set the permissions so the user can't access it, that would save you a lot of trouble.
          Ya, I need to do that, but I run into teh problem of the poor bastard that need sto run tests on teh various OS's, and that's his ONLY mahine. He needs a place to keep some stuff, reports, test cases, etc.

          The dumbass I replaced use dto name c: PRIME and D: SECONDARY. This of course, is stupid.

          I use C:MAIN and D: BACKUP and I havn't had anyone delete anything since. Naming convention are a wonderful thing. You see secodnary and think "Do what I want with it" and Back up is "oh, this is for saving things, don't delete stuff"

          Also, I could hide D: with 2k/xp, but there's the whole ME thing to deal with. It's a pain.
          --Shatter

          "People demand freedom of speech to make up for the freedom of thought which they avoid."
          - Soren Aabye Kierkegaard (1813-1855)

          Comment


          • #20
            But still ............

            I do have question about that html trojan i mean how could somebody have normal html file acting as trojan ?

            Btw i did research about remote.c looks like exploit .......


            anyway i really try to see some html files that are like remote access
            We my be small, but our Shell is big

            Comment


            • #21
              Originally posted by Bosniacon
              But still ............
              I do have question about that html trojan i mean how could somebody have normal html file acting as trojan ?
              If you define a "normal html file" as being one with only HTML tag information, I do not see this as a likely vector for infection or execution of code on a remote system.

              If you define a "normal html file" as being one with HTML tag information and other bits of data which can include javascript, or calls to load java applet, or use code which is browser-specific to take advantage of weaknesses in a browser, then you have chance for being trojaned or having your browser convinced into downloading and executing malicious code from websites which are not trustworthy, or by e-mail message in some versions of MS Lookout! Express and Outlook.

              To me, "normal HTML" is just a text document that conforms to one of the various versions of HTML provided by the w3c. (I do not consider JavaScript or other client-run scripting to be part of normal HTML files.)

              Comment

              Working...
              X