Informative Information for the Uninformed
Current
v9
v8
v7
v6
v5
v4
v3
v2
v1
All
About
Vol 9
»
2008.Jan
Next:
Contents
Contents
http://www.nologin.org
ActiveX - Active Exploitation
01/2008
warlord
warlord@nologin.org
Share what I know, learn what I don't
Contents
Foreword
Introduction
Control and functionality enumeration
ProgIDs
The Kill Bit
User Specific Controls
Determining Exported Functions
Examples
MW6 Technologies QRCode ActiveX 3.0
Enumerating Exported Interfaces
Exploitation
HP Info Center
Vantage Linguistics AnswerWorks
Summary
Acknowledgements
Bibliography
About this document ...