- Поисковые системы
- Практика оптимизации
- Трафик для сайтов
- Монетизация сайтов
- Сайтостроение
- Социальный Маркетинг
- Общение профессионалов
- Биржа и продажа
- Финансовые объявления
- Работа на постоянной основе
- Сайты - покупка, продажа
- Соцсети: страницы, группы, приложения
- Сайты без доменов
- Трафик, тизерная и баннерная реклама
- Продажа, оценка, регистрация доменов
- Ссылки - обмен, покупка, продажа
- Программы и скрипты
- Размещение статей
- Инфопродукты
- Прочие цифровые товары
- Работа и услуги для вебмастера
- Оптимизация, продвижение и аудит
- Ведение рекламных кампаний
- Услуги в области SMM
- Программирование
- Администрирование серверов и сайтов
- Прокси, ВПН, анонимайзеры, IP
- Платное обучение, вебинары
- Регистрация в каталогах
- Копирайтинг, переводы
- Дизайн
- Usability: консультации и аудит
- Изготовление сайтов
- Наполнение сайтов
- Прочие услуги
- Не про работу

Как удалить плохие SEO-ссылки и очистить ссылочную массу сайта
Применяем отклонение ссылок
Сервис Rookee
Авторизуйтесь или зарегистрируйтесь, чтобы оставить комментарий
Интересно, правда ли?
http://www.compulenta.ru/2002/8/9/33115/
Специалисты израильской компании GreyMagiс Software обнаружили уязвимость в утилите Google Toolbar. Данная утилита выпускается компанией Google и является плагином для браузера Internet Explorer, с помощью которого пользователи могут вести поиск в интернете и пользоваться другими службами, предлагаемыми Google....
Поскольку пункт (2) достаточно хорошо известен, я лично верю...
Оригинал http://sec.greymagic.com/adv/gm001-mc/ и
мой перевод всего этого на promosite.ru
Without any user interaction, an attacker can:
Tap to key presses in the toolbar's search box.
Control all visual configuration options.
Enable features with privacy implications.
Clear the toolbar's history.
Completely uninstall the toolbar.
Hijack the toolbar and reroute searches.
Execute arbitrary programs.
Read local files.
Script in the "My Computer" zone.
#1. Tap to key presses in the toolbar's search box.
When typing to the Google toolbar, the currently loaded document still receives all the keyboard events. This flaw is trivial to exploit, by setting a simple "onkeydown" event handler in the document level and waiting for input.
This method is hardly perfect for the attacker since there's no way to know where the cursor is or even whether the user is actually in the Google toolbar. But by analyzing the information grabbed from the keyboard it is quite easy to make an educated guess.
In addition, the attacker can only tap to the toolbar when the user is in his web site, there's no way to use this method outside of it.
#2. Control all visual configuration options.
The method of registering changes in options to the Google toolbar is very insecure. The toolbar is using a special URL to inflict the changes, "http://toolbar.google.com/command?<changes here>". However, it doesn't let the changes occur if the current document is outside of google.com or the special res:// protocol.
That little restriction can be easily circumvented by opening a window that points to google.com or any res:// URL and then, with scripting, change the URL to the toolbar's configuration URL.
The problem described above is the main issue of this advisory and all the other flaws are actually implications of it.
For example, to hide the "Search" button, all an attacker needs to do is follow the steps above and then change the URL to "http://toolbar.google.com/command?Search=0". This can be done with all the other buttons and features.
#3. Enable features with privacy implications.
The toolbar comes with two features that have privacy implications; these are the "PageRank" feature and the "Category" feature.
By following the steps described in #2 and then changing the URL to "http://toolbar.google.com/command?PageRank=1" and "http://toolbar.google.com/command?Category=1" an attacker can enable these features, regardless of their initial setup.
#4. Clear the toolbar's history.
The toolbar has an option to save searches made by it. An attacker can enable this feature by following the steps described in #2 and then changing the URL to "http://toolbar.google.com/command?StoreHist=1" and "http://toolbar.google.com/command?ShowHist=1".
An attacker can remove all searches from history by following the steps in #2 and then changing the URL to "http://toolbar.google.com/command?clearhist".
#5. Completely uninstall the toolbar.
An attacker can uninstall the Google toolbar by following the steps in #2 and then changing the URL to "http://toolbar.google.com/command?uninstall".
#6. Hijack the toolbar and reroute searches.
To search, the toolbar uses a special option called "GoogleHome". An attacker can change the value of the "GoogleHome" option by following the steps in #2 and then changing the URL to "http://toolbar.google.com/command?GoogleHome=<attacker's search handler>".
Starting from that moment on, all web searches would be routed through the attacker's web site. The attacker would be able to log the searches and uniquely identify users. The attacker will then be able to brand the user and offer him services according to the searches made. After logging the search information, the attacker can simply forward the request to Google to remove any suspicions the user may have.
#7. Execute arbitrary programs.
The toolbar command mechanism exposes a very dangerous feature, when called with "http://toolbar.google.com/command?script=<any script>" the script passed to the command will run in the same context as the current document. As mentioned in #2, the toolbar command mechanism accepts two kinds of URLs, any URL in the google.com domain and any res:// URL.
When ran on the google.com domain, the result is a simple domain XSS in google.com. But when ran on any res:// URL the result is full access to the "My Computer" zone.
Once the attacker can access the "My Computer" zone, executing programs is trivial, all an attacker needs to do is follow the steps in #2 and then change the URL to "http://toolbar.google.com/command?script=document.body.insertAdjacentHTML('beforeEnd','<object classid=clsid:10101010-1111-1111-1111-111111111111 codebase=c:/winnt/system32/calc.exe style=display:none></object>')".
#8. Read local files.
Using the same logic described in #7, an attacker can read local files from the client.
By following the steps described in #2 and then changing the URL to "http://toolbar.google.com/command?script=document.body.insertAdjacentHTML('beforeEnd','<iframe id=oFileRead src=file://c:/test.txt></iframe>'); setTimeout(function () { alert(oFileRead.document.documentElement.innerText) },1000)" an attacker can read any local file that is loadable by IE.
#9. Script in the "My Computer" zone.
#7 and #8 are just two examples of the abilities of the "My Computer" zone. It is a very unrestrictive zone and other implications may apply when an attacker is able to inject script into it.
Ну и че теперь!
У меня вот without any действий со стороны юзера почему-то Klez распространяется. Я же не кричу на микрософт.