This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP O2 Platform/Microsoft/ActiveX"
From OWASP
Dinis.cruz (talk | contribs) (Created page with 'This page contains information on how to test ActiveX controls == Security Issues with ActiveX == {list the common problems with ActiveX} == using O2 == One strategy to test Ac…') |
Dinis.cruz (talk | contribs) (→Security Issues with ActiveX) |
||
Line 3: | Line 3: | ||
== Security Issues with ActiveX == | == Security Issues with ActiveX == | ||
{list the common problems with ActiveX} | {list the common problems with ActiveX} | ||
+ | |||
+ | == Tools to test ActiveX for Buffer Overflows == | ||
+ | * http://digitaloffense.net/tools/axman/ | ||
== using O2 == | == using O2 == |
Revision as of 23:33, 7 December 2009
This page contains information on how to test ActiveX controls
Security Issues with ActiveX
{list the common problems with ActiveX}
Tools to test ActiveX for Buffer Overflows
using O2
One strategy to test ActiveX with O2 would be to create a .NET stub around it and then use it to invoke the ActiveX methods
The OWASP .NET tool (couple years old) DN_BOFinder (download from SF) is a .NET Fuzzer which is able to intelligently fuzz .NET assemblies and the COM objects it exposes (see also Buffer_OverFlow_in_ILASM_and_ILDASM
Research Links
- on consuming COM & ActiveX from .NET
This article is a stub. You can help OWASP by expanding it or discussing it on its Talk page.
go back to the main OWASP O2 Platform page