W
wylbur37
I'm presently using Windows XP Pro.
I recently did a curious experiment where I took a 32-byte,
one-line ASCII text file containing the following characters
(without the quotes):
"..\..\diskw\usr\bin\perl w2c1.pl"
and renamed it to have an EXE extension.
Then I opened a Command Prompt window and ran it by typing its name.
Nothing seemed to happen. No messages, nothing.
Other than the fact that I heard the hard drive being accessed for
about a half second, the result was as if I had just typed nothing
and pressed carriage-return.
I then got out of the Command Prompt and went to the Windows Start-Run
textbox and typed in the above program name (including its path).
When I clicked OK, I saw a Command Prompt window come up momentarily
and then vanish a fraction of a second later.
Again, other than that, nothing seemed to happen.
I was wondering about the possible danger of something destructive
occurring from this. Is it possible that the bit patterns of the
characters in the text file might happen to be the same as the
binary instructions that would open a file and modify it, or even
delete a file? I know the odds are extremely rare, but is it possible?
Are there safeguards against this sort of thing? Are all EXE files
expected to have some sort of header such that if this header is not
present, the operating system will not try any further to run the file
even though it may have a filetype of EXE?
In the event that there aren't any safeguards, do you think the
specific example above has the ability to do any damage?
The bit pattern of the above file is as follows ...
(This has to be viewed with Courier or some other fixed-pitch font)
..\..\diskw\usr\bin\perl w2c1.pl
....+....1....+....2....+....3..
LZ: 22522566767577756665767627363276
RZ: EECEEC493B7C532C29EC052C07231E0C
I recently did a curious experiment where I took a 32-byte,
one-line ASCII text file containing the following characters
(without the quotes):
"..\..\diskw\usr\bin\perl w2c1.pl"
and renamed it to have an EXE extension.
Then I opened a Command Prompt window and ran it by typing its name.
Nothing seemed to happen. No messages, nothing.
Other than the fact that I heard the hard drive being accessed for
about a half second, the result was as if I had just typed nothing
and pressed carriage-return.
I then got out of the Command Prompt and went to the Windows Start-Run
textbox and typed in the above program name (including its path).
When I clicked OK, I saw a Command Prompt window come up momentarily
and then vanish a fraction of a second later.
Again, other than that, nothing seemed to happen.
I was wondering about the possible danger of something destructive
occurring from this. Is it possible that the bit patterns of the
characters in the text file might happen to be the same as the
binary instructions that would open a file and modify it, or even
delete a file? I know the odds are extremely rare, but is it possible?
Are there safeguards against this sort of thing? Are all EXE files
expected to have some sort of header such that if this header is not
present, the operating system will not try any further to run the file
even though it may have a filetype of EXE?
In the event that there aren't any safeguards, do you think the
specific example above has the ability to do any damage?
The bit pattern of the above file is as follows ...
(This has to be viewed with Courier or some other fixed-pitch font)
..\..\diskw\usr\bin\perl w2c1.pl
....+....1....+....2....+....3..
LZ: 22522566767577756665767627363276
RZ: EECEEC493B7C532C29EC052C07231E0C