|
Full Disclosure
mailing list archives
Re: DLL hijacking with Autorun on a USB drive
From: paul.szabo () sydney edu au
Date: Wed, 1 Sep 2010 06:52:38 +1000
Charles Morris <cmorris () cs odu edu> wrote:
... Don't run applications from untrusted locations ...
You got it wrong. Only trusted applications are run. - The attacker
prepares a WORD.DOC (and a RICHED20.DLL) file in some place. The
victim clicks on the WORD.DOC file, using his own installed MSWord.
Cheers, Paul
Paul Szabo psz () maths usyd edu au http://www.maths.usyd.edu.au/u/psz/
School of Mathematics and Statistics University of Sydney Australia
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
By Date
By Thread
Current thread:
- Re: DLL hijacking with Autorun on a USB drive, (continued)
Re: DLL hijacking with Autorun on a USB drive Sherwyn (Aug 26)
Re: DLL hijacking with Autorun on a USB drive matt (Aug 27)
(Thread continues...)
|