New User? Need help? Click here to register for free! Registering removes the advertisements.

Computer Cops
image image image image image image image image
Donations
If you found this site helpful, please donate to help keep it online
Don't want to use PayPal? Try our physical address
image
Prime Choice
· Head Lines
· Advisories (All)
· Dnld of the Week!
· CCSP News Ltrs
· Find a Cure!

· Ian T's (AR 24)
· Marcia's (CO8)
· Bill G's (CO12)
· Paul's (AR 5)
· Robin's (AR 2)

· Ian T's Archive
· Marcia's Archive
· Bill G's Archive
· Paul's Archive
· Robin's Archive
image
Security Central
· Home
· Wireless
· Bookmarks
· CLSID
· Columbia
· Community
· Downloads
· Encyclopedia
· Feedback (send)
· Forums
· Gallery
· Giveaways
· HijackThis
· Journal
· Members List
· My Downloads
· PremChat
· Premium
· Private Messages
· Proxomitron
· Quizz
· RegChat
· Reviews
· Google Search
· Sections
· Software
· Statistics
· Stories Archive
· Submit News
· Surveys
· Top
· Topics
· Web Links
· Your Account
image
CCSP Toolkit
· Email Virus Scan
· UDP Port Scanner
· TCP Port Scanner
· Trojan TCP Scan
· Reveal Your IP
· Algorithms
· Whois
· nmap port scanner
· IPs Banned [?]
image
Survey
How much can you give to keep Computer Cops online?

$10 up to $25 per year?
$25 up to $50 per year?
$10 up to $25 per month?
$25 up to $50 per month?
More than $50 per year?
More than $50 per month?
One time only?
Other (please comment)



Results
Polls

Votes: 1195
Comments: 21
image
Translate
English German French
Italian Portuguese Spanish
Chinese Greek Russian
image
 Forum FAQForum FAQ   SearchSearch   UsergroupsUsergroups   ProfileProfile   Login to check your private messagesLogin to check your private messages   LoginLogin   Your Favorite ForumsFavForums 

ActiveX via Scripts
Goto page 1, 2  Next
 
Post new topic   Reply to topic       All -> FavForums -> Proxomitron General
View previous topic :: View next topic  
Author Message
LWC

Trooper
Trooper



Joined: Feb 13, 2004
Posts: 27
Location: Israel

PostPosted: Fri Feb 13, 2004 6:07 am    Post subject: ActiveX via Scripts
Reply with quote

This topic was originally about an annoying scripts that used ActiveX commands to eject my CD drives.
However, later on I got a spyware (another user claimed it's even a trojan!) because of it and therefore decided to change the topic to reflect the general dangers of this thing and not just the original problem.
See my later post for my new filter that deals with the general problem.

Scary! Script that ejects my CD drives!

With all my general protection and all the filters in Proxomitron, I thought I'm driving in a tank in the dark corridors of the Internet.

And then I surfed into http://faked.org and my CD drives started to eject one by one!

I thought I'm getting a heart attack.
Did this site just install me a trojan, I thought.

But when I came back to my senses, I looked in the source code and found this, well, simple javascript:
Code:

<script language="javascript">
var oWMP = new ActiveXObject("WMPlayer.OCX.7");
var colCDROMS = oWMP.cdromCollection;
if (colCDROMS.Count >= 1){
for(i = 0; i <= colCDROMS.Count; i++)
colCDROMS.Item(i).Eject();
}
</script>

BTW, it works without the language="javascript" part just as well (i.e. simply <script>).

Now, of course I can just capture the entire thing and remove it all via a filter, but I want something to block any other "version" of this too.

How the hell did Microsoft allow an ActiveX to control my WMP remotely?!
If people can eject CD drives, what else can they do?

Now, someone here once helped me shut ActiveX completly so I wouldn't see those annoying SWF ads. So how do I shut it off when it comes in the shape of a javascript?
Or do you think I should just shut it off when it uses "WMPlayer.OCX.7"?

Thanks!


Last edited by LWC on Sun Apr 11, 2004 11:38 am, edited 4 times in total
Back to top
View users profile Send private message
LWC

Trooper
Trooper



Joined: Feb 13, 2004
Posts: 27
Location: Israel

PostPosted: Sun Feb 15, 2004 5:18 am    Post subject:
Reply with quote

What are the odds?

I've just entered this page and the same thing happened - only this time via Vbscript!
Code:

<SCRIPT language=VBScript>
Set oWMP = CreateObject("WMPlayer.OCX.7" )
Set colCDROMs = oWMP.cdromCollection

if colCDROMs.Count >= 1 then
   For i = 0 to colCDROMs.Count - 1
      colCDROMs.Item(i).Eject
   Next ' cdrom
End If
</SCRIPT>


Note: unlike the javascript, this one will only run if you specify the "language=VBScript" part. Is it because Javascript is assumed as default or what?
Back to top
View users profile Send private message
z12

Sergeant
Sergeant



Joined: Jul 17, 2002
Posts: 135
Location: USA

PostPosted: Sun Feb 22, 2004 8:26 am    Post subject:
Reply with quote

lol, if your going to browse sites like that with ActiveX enabled, your asking for trouble.

If you must use IE, I recommend setting you Internet zone security settings to High & then setting the trusted zone settings to medium.

Or, better yet, use Firefox. ActiveX and VbScripts don't work with it since that stuff is MS only.

Do you really trust running software from warez sites?

Mike
Back to top
View users profile Send private message
LWC

Trooper
Trooper



Joined: Feb 13, 2004
Posts: 27
Location: Israel

PostPosted: Sun Feb 22, 2004 8:56 am    Post subject:
Reply with quote

What do you mean "running a program"? It's not like someone asked me. This is NOT an ActiveX control or something like that! It's just a script. Every site can use it. It's not like those messages which ask "would you like to download X"? It's just a simple script!

Besides, the first example is not even ActiveX! It's Javascript!
And the ActiveX one is not so much ActiveX as it is VBScript!

And in XP, IE's security settings are automatically changed into "custom".

Anyway, I think there should be a Proxomitron filter that gets rid of every script that uses "curse words" like "WMPlayer.OCX.7".

And speaking of ActiveX (and this doesn't have to be related!), another filter altogether that gets rid of ActiveX scripts, for that matter. Why? Well, because, unlike Javascripts, ActiveX scripts are basically VBScript. And VBScript has unlimited power...
When I want to automate something, I'll use VBScript. But not online, thank you.
Back to top
View users profile Send private message
z12

Sergeant
Sergeant



Joined: Jul 17, 2002
Posts: 135
Location: USA

PostPosted: Sun Feb 22, 2004 12:09 pm    Post subject:
Reply with quote

LWC,

Hi. First of all, I'm having a bit of a problem following your reply, bit here we go...

When I looked at the link in your 2nd post, ://youarelame.com/warez/, I couldn't help but laugh.

warez = hacked software

Personally, I wouldn't trust any software downloaded from a warez site, no telling what your getting.

heres a code snippet from that site:
Code:

<title>You Are Lame</title>
<meta name="keywords" content="you, are, lame, lamer, idiot, stupid, loser">
<meta name="description" content="Yes, you truly deserve it.  You Are Lame!">


About ActiveX, from example #1:
Code:

var oWMP = new ActiveXObject("WMPlayer.OCX.7");

from example #2:

Set oWMP = CreateObject("WMPlayer.OCX.7" )


Both of these scripts depend upon ActiveX. If ActiveX is disabled, they will fail.

The default security settings for IE in XP do not disable ActiveX.


Anyway, VbScript & ActiveX don't work with firefox, and thats the way I like it. Very Happy

Mike

edit: added code tag Laughing


Last edited by z12 on Sun Apr 11, 2004 12:21 pm, edited 1 time in total
Back to top
View users profile Send private message
Structure

Trooper
Trooper



Joined: Mar 03, 2004
Posts: 10
Location: USA

PostPosted: Fri Mar 12, 2004 6:16 pm    Post subject:
Reply with quote

Just turn off ActiveX.
Back to top
View users profile Send private message
LWC

Trooper
Trooper



Joined: Feb 13, 2004
Posts: 27
Location: Israel

PostPosted: Sat Mar 13, 2004 10:27 am    Post subject:
Reply with quote

First of all, I've already mentioned it's more of a Vbscript that it is ActiveX.

Secondly, instead of disabling legitimate uses by innocent sites, I rather disable just this one specific use.
Back to top
View users profile Send private message
Structure

Trooper
Trooper



Joined: Mar 03, 2004
Posts: 10
Location: USA

PostPosted: Sun Mar 14, 2004 12:57 am    Post subject:
Reply with quote

I understand, but turning off the ActiveX controls in the Internet Options will prevent the ejects. Whatever you want to call the code, it is disabled by the ActiveX settings.

There are also other malicious things in ActiveX, but I don't know them by name. I know once I went to a link pasted in a chatroom which displayed a picture. Innocent enough I thought, but on the way to close I was prompted to allow an ActiveX control. (I had previously set it to Prompt mode) I said no, and later found out it was a virus that corrupts your Windows install after execution.

ActiveX is too much of a security problem imo, that's why I recommend turning it off. Yea it kills flash and certain other things, but I don't miss them much.
Back to top
View users profile Send private message
Lepus

Trooper
Trooper



Joined: Mar 02, 2004
Posts: 15
Location: USA

PostPosted: Sun Mar 14, 2004 1:52 am    Post subject:
Reply with quote

LWC wrote:
First of all, I've already mentioned it's more of a Vbscript that it is ActiveX.

Secondly, instead of disabling legitimate uses by innocent sites, I rather disable just this one specific use.


No, as other have said it most certainly is a ActiveX thing. It has nothing to do with the scripting language - an ActiveX object can be created in VB script or Javascript and it's the media player ActiveX object they're using to eject the drive. You could make a Proxo filter for it too, but you're safer by far to just disable or restrict ActiveX in IE. IMO there's little to no "legitimate" use for ActiveX - we're not talking about disabling all scripting. Most pages don't need it, and I'd be suspicious of any pages that do.
Back to top
View users profile Send private message
PrivateEye

Cadet
Cadet



Joined: Feb 13, 2004
Posts: 3
Location: Netherlands

PostPosted: Thu Mar 18, 2004 11:26 am    Post subject:
Reply with quote

There is some functionality in IE6 that allows you to control which ActiveX controls are allowed to run on your machine (and blocks the rest).

In Internet Explorer, go to Tools>Options>Security>Custom Level>
Find the option: "Run ActiveX controls and plug-ins" and change it to "Administrator Approved"

Next, open regedit and go to:
HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\AllowedControls
Add a DWORD entry for each CLSID value of the ActiveX component that you wish to allow and set the value to ZERO (to allow).

If you don't know the the CLSID value, you can find the ones already loaded on your machine by going to ..\WINDOWS\Downloaded Program Files. Right click on the ActiveX component concerned and select Properties.
You might want to check this folder anyway to see which ActiveX components you are already using and add them to the list - be sure to run ad-aware/Pest-Patrol/Spycop or some other program that is capable of detecting which ActiveX components are adware/spyware. You don't want to authorise those ones by mistake!). SIGNED (and therefore relatively trustworthy ActiveX controls will give you an indication as to what they are and what they are for. The company name ought to be visible in the version tab - if not, do not trust it (rule of thumb). If you don't know the company, at least check it out on the web...

Some common CLSID's:
{9F1C11AA-197B-4942-BA54-47A8489BB47F} Windows update
{DF6A0F17-0B1E-11D4-829D-00C04F6843FE} Microsoft Office update
{D27CDB6E-AE6D-11CF-96B8-444553540000} Flash Shockwave
{22D6F312-B0F6-11D0-94AB-0080C74C7E95} MediaPlayer
{06DD38D3-D187-11CF-A80D-00C04FD74AD8} Plug-ins, including Acrobat Reader
{CA8A9780-280D-11CF-A24D-444553540000} Acrobat Reader
{CFCDAA03-8BE4-11CF-B84B-0020AFBBCCFA} Real Player
{02BF25D5-8C17-4B23-BC80-D3488ABDDC6B} QuickTime


As you can see from the list above, there ARE legitimate reasons for allowing ActiveX with IE6. ActiveX was not designed solely with advertisers and hackers in mind...
Back to top
View users profile Send private message
LWC

Trooper
Trooper



Joined: Feb 13, 2004
Posts: 27
Location: Israel

PostPosted: Sun Apr 11, 2004 11:26 am    Post subject:
Reply with quote

Well, after encountering first hand the gross creature from
http://www.computercops.biz/postt30078.html
(and the scary part is that unless my WAV files stopped working, who
knows how long it could be before I found it out!),
I've finally decided that there's no "legitimate" use for to load ActiveX commands via scripts and so I present my new filter:

Code:

[Patterns]
Name = "Disable: ActiveX via Scripts"
Active = TRUE
URL = "($TYPE(htm)|$TYPE(js))"
Limit = 100
Match = "(\s|;)(var|set)*\0=*(ActiveX|Create)Object"
        "\( $AV(\1) \)"
Replace = "// Disabled ActiveX code by killing\0"
          "$ALERT(Hack attempt disabled!\n"
          "\n"
          "\u\n"
          "has just tried to invade your machine\n"
          "by using a dubious ActiveX code\n"
          "that remote controls "\1"!\n"
          "\n"
          "Your protection has disabled it!)"


The script works by cutting out the original parameter that calls up the Vbscript command (e.g. media player), which all the rest totally depend on.

It was tested on the two sites mentioned earlier ("Faked" and "Warez"). I wasn't brave enough to try it out against the aforementioned trojan...

Anyway, import it and stop fearing "ActiveX via Scripts".

Yours Truly

P.S.
Hey z12, would you mind editing your post and use code tags this time (for your example quotes)? My new filter thinks you're a hacker...Wink
Back to top
View users profile Send private message
Structure

Trooper
Trooper



Joined: Mar 03, 2004
Posts: 10
Location: USA

PostPosted: Sun Apr 11, 2004 10:39 pm    Post subject:
Reply with quote

Interesting. Does it still allow launching of simple activex objects? (like flash / quicktime)
Back to top
View users profile Send private message
LWC

Trooper
Trooper



Joined: Feb 13, 2004
Posts: 27
Location: Israel

PostPosted: Mon Apr 12, 2004 6:43 am    Post subject:
Reply with quote

Absolutely, because Flash and Quicktime are launched through an <object tab and not via scripts! That's why I said I can't think of any legitimate use for it.
Back to top
View users profile Send private message
Fluffbutt

Cadet
Cadet



Joined: Apr 07, 2004
Posts: 8
Location: Australia

PostPosted: Mon Apr 12, 2004 10:33 am    Post subject:
Reply with quote

That works, it kills the activex. BUT it still allows the viraltype code to come to the hard drive, and the antivirus program jumps up with a Virus!!!! message. It's not active, it's just annoying to have the AV proggie think so..

My other attempt kills the textarea with the code id, and buggers up the java script line= bits. The end result is that the anti virus program is quiescent.

_________________
|
Meeow!
Back to top
View users profile Send private message
LWC

Trooper
Trooper



Joined: Feb 13, 2004
Posts: 27
Location: Israel

PostPosted: Mon Apr 12, 2004 1:09 pm    Post subject:
Reply with quote

Quote:

That works, it kills the activex. BUT it still allows the viraltype code to come to the hard drive

Well, all it does is kill one line, but that line defines the one parameter that the rest of the script depends on.
So in that sense, it's like the Outlook Express feature that lets you download viruses in the e-mail, but just prevents you from clicking them...
Quote:

and the antivirus program jumps up with a Virus!!!! message. It's not active, it's just annoying to have the AV proggie think so..

Well, are you sure you didn't just mean my simple alert command? Compare your message with the one in the filter's. If that's your problem, just delete the "$ALERT" tag and everything after it and Proxomitron won't "bother" you whenever some site tries to hack you...
Quote:

My other attempt kills the textarea with the code id, and buggers up the java script line= bits. The end result is that the anti virus program is quiescent.

Maybe so, but I learned my lesson in the CD drives ejection filter (original post). I rather have a general filter that disables any future versions of this trouble too, while yours just blocks this specific method.
All the hacker has to do is tweak something (i.e. use something else instead of a <textarea, etc.) and your filter is worthless...
Back to top
View users profile Send private message
Display posts from previous:   
Post new topic   Reply to topic       All -> FavForums -> Proxomitron General All times are GMT - 5 Hours
Goto page 1, 2  Next
Page 1 of 2

 
 
Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
You cannot attach files in this forum
You can download files in this forum


Powered by phpBB 2.0.8a © 2001 phpBB Group

Version 2.0.6 of PHP-Nuke Port by Tom Nitzschner © 2002 www.toms-home.com
Version 2.2 by Paul Laudanski © 2003-2004 Computer Cops