Reverse Engineering WMF Exploit Code
As we have reported, there are still thousands of websites hosting WMF exploit code.Since we have been analyzing several of these, we thought we would share some steps in researching the behavior of the what the exploit code is doing.
This video displays malicious WMF Files debugging. It shows how you can easily locate and debug the embedded shell code of WMF files, to find out what it was supposed to do.
If you want to try it yourself, do it inside a Virtual Machine and on an unpatched Windows. Websense Security Labs - Blog
Back to: PC Security, privacy news