tonynuc
02-07-2008, 09:28 AM
The CEH technique enables an attacker to exploit a local XSS vulnerability in order to “hop” to a different environment, such as another locally installed server. Under certain circumstances it may even be possible for an attacker to access remote network services such as network share drives, remote procedure calls, intranet mail, SQL servers, and so on.
**Hidden Content: Check the thread to see hidden data.**
**Hidden Content: Check the thread to see hidden data.**