-
Notifications
You must be signed in to change notification settings - Fork 10
Expand file tree
/
Copy pathReadme.txt
More file actions
executable file
·37 lines (28 loc) · 1.23 KB
/
Readme.txt
File metadata and controls
executable file
·37 lines (28 loc) · 1.23 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
FSExploitMe -
By Brad.Antoniewicz@foundstone.com (@brad_anton)
A purposely vulnerable ActiveX control for learning exploitation. Everything
is browser based to guide the student towards browser exploitation however
these vulnerabilities are really in the ActiveX Control, not the browser itself.
There are some limitations. For instance, L3HeapSpray() only works on IE8. You'll
need a newer heapsray function to complete Lesson 3 on newer browsers.
Answers are specifically blank in this release. If you'd like to access them,
please contact me and I'll send them to you, assuming you're not one of my
students :)
FSExploitMe.html -
Interface to invoke the various vulns.
FSExploitMe.ocx -
Main ActiveX Control.
From an elevated command prompt, run:
regsvr32 /i FSExploitMe.ocx
And copy to c:\windows\downloaded program files
js/css -
To make things pretty - using Foundation. http://foundation.zurb.com/
img -
Supporting Images
Notes:
The Debug and Release versions available with Visual Studio will
alter the resulting binary, which will change any hardcoded answers
in the labs.
Shoutz:
This was based off an idea by Dan Guido and those Trail of Bits rock stars :)
http://pentest.cryptocity.net/exploitation/