Wait, you hid a .exe file in a .ppt file, and had the user download
the .ppt file which upon opening opens a .exe file?

Sounds to me like you're trying pretty damn hard to exploit
vulnerabilities in IE/Firefox/Chrome and resorting to exploiting
vulnerabilities in powerpoint instead.

Whilst I'm glad that this is proving tricky for you, I have to say
that posting a question regarding how to exploit software on a
development mailing list has labelled you as quite a few ranks below
your common-or-garden script kiddie... Thus, you aren't even a threat
if you DO succeed in exploiting powerpoint, firefox, chrome or
internet explorer.

Still, posting helpful advice for you without knowing that your intent
is legitimate (I have made the assumption that it is not, based upon
the lack of evidence to the contrary) would be dangerous as a more
threatening adversary could get hold of this advice (it's posted on a
public mailing list) and use it in a more dangerous fashion than you
intend (or are capable of).

Basically, you're looking in the wrong place for help if you want to
crack stuff.  If you can provide a legitimate reason for what you want
to do, I (and many others) can help you build a solution that doesn't
have any knock-on effect to the user's security.

I am also intrigued to know just how you managed to get such a
solution working in Firefox, so I will be watching this thread
intently.
--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups 
"Chromium-discuss" group.
To post to this group, send email to [email protected]
To unsubscribe from this group, send email to 
[email protected]
For more options, visit this group at 
http://groups.google.com/group/chromium-discuss?hl=en
-~----------~----~----~----~------~----~------~--~---

Reply via email to