Poorly written ActiveX controls have been a major source of security
vulnerabilities in recent years, and unwitting users who install defective
controls often leave themselves open to full system compromise at the hands
of any malicious web site that invokes and exploits the control. In Chapter 12,
we describe how you can find and exploit common vulnerabilities in ActiveX
controls to attack other users of an application.
There are various techniques that can be used to circumvent client-side con-
trols implemented using ActiveX.
Do'stlaringiz bilan baham: |