September 15th, 2006, 11:33 PM
** HEAD UP ** Workaround for 0-day AVAILABLE.
This thread is in connection with my thread about new 0-day in IE (http://www.antionline.com/showthread...hreadid=276559). It is advised to read that thread first to understand the vulnerability in IE.
I found 2 software "Killbit apps" which are workaround's for the current IE explot.
Remember to check the checksum (MD5) after downloading..
To make life a little easier, I put together two small apps to set and unset the appropriate "kill bit" to block the actions of the current IE exploit. They can be found here:
- Standard Windows executable
- Command line version
The command line version, when run without any parameters, will set the "kill bit". When run with any parameter (i.e. something like "/r"), will remove the "kill bit."
The standard Windows executable, when run, will tell you the current status of the kill bit and offer you the option of changing it.
THANKS TO EVERY HANDLER AT ISC for making life easier.
CISSP, CISM, CISA, SSCP
*Thank you GOD*
Greater the Difficulty, SWEETER the Victory.
Believe in yourself.