Demonstration of Drive-by Downloads
        
        - Purpose
 
        
        Purpose
            Demonstrate drive-by downloads
 to conduct the well-known and
            well-documented attack
            CAPEC-471: Search Order Hijacking
            listed in the
            CAPEC™
            against the well-known and well-documented weaknesses
            CWE-426: Untrusted Search Path
            and
            CWE-427: Uncontrolled Search Path Element
            listed in the
            CWE™,
            present in almost all executable installers,
            self-extracting executable archives
            (SFXs) and
            portable
 applications built for
            Microsoft®
            Windows™, despite the instructions
            given in the
            MSDN articles
            Dynamic-Link Library Security
            and
            Dynamic-Link Library Search Order,
            the Security Advisory
            2269637,
            plus the
            MSKB
            articles
            2389418
            and
            2533623.
        Contact and Feedback
            If you miss anything here, have additions, comments, corrections,
            criticism or questions, want to give feedback, hints or tipps,
            report broken links, bugs, deficiencies, errors, inaccuracies,
            misrepresentations, omissions, shortcomings, vulnerabilities or
            weaknesses, …: don’t hesitate to
            contact me
            and feel free to ask, comment, criticise, flame, notify or report!
         Use the
            X.509
            certificate
            to send
            S/MIME
            encrypted mail.
        
 Note: email in weird format and without a proper
            sender name is likely to be discarded!
        
 I dislike
            HTML (and even
            weirder formats too) in email, I prefer to receive plain text.
        
I also expect to see your full (real) name as sender, not your
            nickname.
        
I abhor top posts and expect inline quotes in replies.
        
Terms and Conditions
            By using this site, you signify your agreement to these terms and
            conditions. If you do not agree to these terms and conditions, do
            not use this site!
        
        - The software and the documentation on this site are provided
            
as is
 without any warranty, neither express nor implied.
        
In no event will the author be held liable for any damage(s) arising
            from the use of the software or the documentation.
         
        - Permission is granted to use the current version of
            the software and the current version of the
            documentation solely for personal private and non-commercial
            purposes.
        
An individuals use of the software or the documentation in his or
            her capacity or function as an agent, (independent) contractor,
            employee, member or officer of a business, corporation or
            organisation (commercial or non-commercial) does not qualify as
            personal private and non-commercial purpose.
         
        - Without written approval from the author the software or the
            documentation must not be used for a business, for
            commercial, corporate, governmental, military or organisational
            purposes of any kind, or in a commercial, corporate, governmental,
            military or organisational environment of any kind.
        
 
        - Redistribution of the software and the documentation is allowed only
            in unmodified form of its current version and free
            of charge.
        
 
        
        Data Protection Declaration
            This web page records no (personal) data and stores no
            cookies
 in the web browser.
         The web service is operated and provided by
        
            Telekom Deutschland GmbH
        
Business Center
        
D-64306 Darmstadt
        
Germany
        
<hosting@telekom.de>
        
+49 800 5252033
        
         The web service provider stores a session cookie
 in the web
            browser and records every visit of this web site with the following
            data in an access log on their server(s):
        
        - the (pseudonymised)
            IP address;
        
 
        - the date and time of the request;
        
 
        - the URL of
            the requested web page or file;
        
 
        - the Referer and User-Agent
            HTTP
            headers sent by the web browser;
        
 
        - the result (success or failure) of the request;
        
 
        - the amount of data received and sent.
        
 
        
        
        
            Copyright © 1995–2025 • Stefan Kanthak •
            <stefan.kanthak@nexgo.de>