D
d4m.test
Guest
MICAVI said:But what is exploitable? I mean we don' need a hacker tutorial or anything, but what do they have to do to get into your system?
OK.. mock situation..
Lets say you have never done any microsoft windows updates. I'm sitting on MSN, or a chat room, or even on this forum board and send you a picture.. you think to yourself, you don't know me, and its just a picture, no harm in that.. you open the picture and everything is fine.. but what you don't know is that the .jpg that I just sent you had some arbitrary code in it that exploited the GDI buffer in microsoft windows, which in turn just gave me complete access to your computer.. so while you are browsing the forums here, I'm installing keyloggers, going through all your bank information you have saved on your harddrive, even browsing through your family pictures, all without you even knowing.
So your thinking to yourself, how could a picture do all of that?!?!
http://www.microsoft.com/technet/securi ... 7-017.mspx
now thats just ONE of many exploits that have been found on windows.... I could give you more mock situations if you want.. but I think that one is good enough