Welcome to HBH! If you have tried to register and didn't get a verification email, please using the following link to resend the verification email.

Testing some different protocols...


Uber0n's Avatar
Member
0 0

[img]http://tinyurl.com/28esr3[/img] [img]http://tinyurl.com/28tf8k[/img] [img]http://tinyurl.com/2ho8yu[/img] [img]http://tinyurl.com/24fzsf[/img]

[img]http://tinyurl.com/28m5hs[/img] [img]http://tinyurl.com/2e98qn[/img]


ghost's Avatar
0 0

Been done before, still annoying


ghost's Avatar
0 0

my computer is slow as hell and you made it crash opening outlook along with the other progs i already had open :angry: end3r


ghost's Avatar
0 0

end3r wrote: my computer is slow as hell and you made it crash opening outlook along with the other progs i already had open :angry: end3r

lmao!! well done you have found out how to crash end3rs computer along with everyone here who has a old pc


ghost's Avatar
0 0

:S nothing opened for me…


Uber0n's Avatar
Member
0 0

mozzer wrote: Been done before, still annoying

I know that it's been done with irc protocol and telnet protocol before, just wanted to try out a few more :p


ghost's Avatar
0 0

I'm intrigued.

I figured out the 'enter user and pass to login' pop up that went around a few weeks ago. Someone just used the image tag to link to an image that was forbidden on some server.

But this is using some outlook protocol and a bunch of other shit i can't figure out. i went to the tinyurl address, but nothing is there. it just fires the protocal upon arrival with no source… i was expecting some javascript window.location="outlook:action" but huh…

anybody want to pm a hint on this one? :D


ghost's Avatar
0 0

DigitalFire wrote: I'm intrigued.

I figured out the 'enter user and pass to login' pop up that went around a few weeks ago. Someone just used the image tag to link to an image that was forbidden on some server.

But this is using some outlook protocol and a bunch of other shit i can't figure out. i went to the tinyurl address, but nothing is there. it just fires the protocal upon arrival with no source… i was expecting some javascript window.location="outlook:action" but huh…

anybody want to pm a hint on this one? :D

Idk but I don't think javascript can be in any way injected like that…

Nah he used things like:

nntp://uber0n/ for email

aim:goim w/e for aim

telnet://whatever:port through tinyurl etc etc. Anything that can be launched this way has to have the ability to be just typed in the browser to have launched, for example type telnet://hellboundhackers.org:80 in the browser bar, it launches the app. :ninja:


richohealey's Avatar
Python Ninja
0 0

end3r wrote: my computer is slow as hell and you made it crash opening outlook along with the other progs i already had open :angry: end3r

how on earth did you post that if this page crashes your browser?


ghost's Avatar
0 0

Idk but I don't think javascript can be in any way injected like that…

Nah he used things like:

nntp://uber0n/ for email

aim:goim w/e for aim

telnet://whatever:port through tinyurl etc etc. Anything that can be launched this way has to have the ability to be just typed in the browser to have launched, for example type telnet://hellboundhackers.org:80 in the browser bar, it launches the app. :ninja:

true.

but alright tinyurl is redirecting some source from some page to our browsers. i want to figure out what that is. because the source of the images is not "nntp:uber0n" its a tinyurl. so somehow the protocol is attached to the tinyurl or something. this is what i can't figure out.


spyware's Avatar
Banned
0 0

Hope that helps

It's like the blind leading the deaf.


ghost's Avatar
0 0

[img]http://tinyurl.com/8bmtxa[/img]


ghost's Avatar
0 0

Thankfully URI abuse has been done, patched, and mostly over with. With the amount of dynamic crap you can do with a page, however, certain ones (mailto) might not ever be dead.