Quote:
Originally Posted by gabri3l
Recent paper released by Forcepoint uses StrongOD as an example of the risks around relying on an unsupported plugin (that specifically calls home).
TLDR; They identify a vulnerability in the update file StrongOD looks for on startup and sinkhole the domain that StrongOD used to call home in order to capture the IP addresses of Olly users.
hxxps://blogs.forcepoint.com/security-labs/freeman-perils-abandonware
|
...now you have forced my to stop being lazy and check all my plugins!
(IOW, TY!!!)
Of course, I had a copy - just in case and checked it: StrongOD v0.4.8.892.rar
.text:1000F874 push offset aHttpWww_crackl ; "http://www.cracklife.com/sod/update.txt"...
.text:1000F88F mov ecx, offset aHttpWww_crackl ; "http://www.cracklife.com/sod/update.txt"...
.text:1000F8AB mov esi, offset aHttpWww_crackl ; "http://www.cracklife.com/sod/update.txt"...
.rdata:100436C0 aHttpWww_crackl db 'http://www.cracklife.com/sod/update.txt',0 ; DATA XREF: sub_1000F7B0+C4o