-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Dear 3APAPA,
Please configure your Internet Exploring mechanisms in a fashion compliant with my exploitation technologies to demonstrate the severity of my proof of concept attack tools. Here is a list of criteria to fulfill to make the hacker attack possible. This is severe! Millions who follow the instructions in detail might be vulnerable under the right situations sometimes... yawn. - -JP<i dont use apostrophes> On Tue, 16 Oct 2007 11:27:23 -0400 [EMAIL PROTECTED] wrote: >...some additional information about 0day PDF exploit PoC: > >Please download and open PDF PoC _locally_ in Adobe Acrobat (not >in Adobe >Acrobat ActiveX control >because of some internal restrictions within Adobe ActiveX, it may >be >bypassed via: >http://seclists.org/bugtraq/2007/Oct/0213.html but i didn't made >tests). > >Also make sure that "mailto" handler is set to Internet Explorer 7 >(any 3rd >party mail >clients is not installed). > >PoC tested on WinXP SP2 Eng updated + Internet Explorer 7 + Adobe >Acrobat >Reader 8.1 > >PoC: http://security.fedora-hosting.com/0day/pdf/pdf_poc.pdf >Details: http://security.fedora-hosting.com/0day/pdf/pdf_poc.txt > > >regards, >cyanid-E <[EMAIL PROTECTED]> -----BEGIN PGP SIGNATURE----- Note: This signature can be verified at https://www.hushtools.com/verify Charset: UTF8 Version: Hush 2.5 wpwEAQECAAYFAkcU2sAACgkQ+dWaEhErNvTD2AP9GWi6tgjXfSS6mmSEcNXCngEnJAXf 8p8i57pby3KmK6Os29OeesSIedRgM81MxrF8bZ2itPpNYtyrVAC5ztWEfAVJDP01z9CL 93B9OS/IdedZSvXokQAHrtEdO6wZHarddeE772GG3RfWlY5a/SA8agWUIkGAALugJyvR gPyqE40= =sCNw -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
