Curious About Internet Transfer Control And Malicious Sites
Curious About Internet Transfer Control And Malicious Sites
Curious About Internet Transfer Control And Malicious Sites
Curious About Internet Transfer Control And Malicious Sites
Curious About Internet Transfer Control And Malicious Sites
Curious About Internet Transfer Control And Malicious Sites Curious About Internet Transfer Control And Malicious Sites Curious About Internet Transfer Control And Malicious Sites Curious About Internet Transfer Control And Malicious Sites Curious About Internet Transfer Control And Malicious Sites Curious About Internet Transfer Control And Malicious Sites Curious About Internet Transfer Control And Malicious Sites Curious About Internet Transfer Control And Malicious Sites
Curious About Internet Transfer Control And Malicious Sites Curious About Internet Transfer Control And Malicious Sites
Curious About Internet Transfer Control And Malicious Sites
Go Back  Xtreme Visual Basic Talk > > > Curious About Internet Transfer Control And Malicious Sites


Reply
 
Thread Tools Display Modes
  #1  
Old 03-21-2015, 01:46 PM
vblumberguy vblumberguy is offline
Newcomer
 
Join Date: Mar 2015
Posts: 2
Cool Curious About Internet Transfer Control And Malicious Sites


I am using the Microsoft Internet Transfer control and I have a list of URL starting points, but I am spidering off those sites.

The main Inet line I am curious about is:
Code:
b() = objInet.OpenURL(objInet.URL, icString)
It chugs along and does what I want, but it has come across some sites that Avast has said it blocked due to malicious code on that site.

I am saving that b() value using Binary Access Write to a .txt file that I parse with another routine.

I get that Avast recognizes patterns in data that matches those in the Avast virus/trojan/pup database and alerts me, but I am wondering when the Internet Transfer Control is getting the chunks of data and writing them to the binary file (which I gave the extension of .txt NOT htm or html) if any of that code from that website is actually executed behind the scenes in the Inet control.

I suspect it is just writing the data directly from the source and as long as I do not write it to an htm or html and click on it or type the URL into my browser, it cannot execute the malicious code.

Or... does the ITC actually navigate to each site behind the scenes. Even if this were the case, I would think the ITC for VB6 is too old to be able to even run the malicious scripts of today, but I could be wrong.

I am curious, not concerned. Avast seems to be doing a bang up job of catching everything and I have a bare image on my VB 6 dev PC. After spidering the sites I have here and parsing them I will blow this image out and start fresh. To spider all the sites and get the data I want will take a few hours so I'm not too worried about being hacked.

Yes I am screen scraping a little, but it is just a time saving thing for me if it works (which it seems to be at the moment). I could collect this data manually, but why?

Btw, I tried to do this in Python and I believe it actually does navigate and I could not get Resume Next to work (I gave up) and my script would stop and crash. Isn't VB great?
Reply With Quote
Reply


Currently Active Users Viewing This Thread: 1 (0 members and 1 guests)
 
Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off

Forum Jump

Advertisement:





Free Publications
The ASP.NET 2.0 Anthology
101 Essential Tips, Tricks & Hacks - Free 156 Page Preview. Learn the most practical features and best approaches for ASP.NET.
subscribe
Programmers Heaven C# School Book -Free 338 Page eBook
The Programmers Heaven C# School book covers the .NET framework and the C# language.
subscribe
Build Your Own ASP.NET 3.5 Web Site Using C# & VB, 3rd Edition - Free 219 Page Preview!
This comprehensive step-by-step guide will help get your database-driven ASP.NET web site up and running in no time..
subscribe
Curious About Internet Transfer Control And Malicious Sites
Curious About Internet Transfer Control And Malicious Sites
Curious About Internet Transfer Control And Malicious Sites Curious About Internet Transfer Control And Malicious Sites
Curious About Internet Transfer Control And Malicious Sites
Curious About Internet Transfer Control And Malicious Sites
Curious About Internet Transfer Control And Malicious Sites Curious About Internet Transfer Control And Malicious Sites Curious About Internet Transfer Control And Malicious Sites Curious About Internet Transfer Control And Malicious Sites Curious About Internet Transfer Control And Malicious Sites Curious About Internet Transfer Control And Malicious Sites Curious About Internet Transfer Control And Malicious Sites
Curious About Internet Transfer Control And Malicious Sites
Curious About Internet Transfer Control And Malicious Sites
 
Curious About Internet Transfer Control And Malicious Sites
Curious About Internet Transfer Control And Malicious Sites
 
-->