Skip to content
November 18, 2008 / technocrawl

Internet Explorer Hacks

Internet Explorer

Internet Explorer fetches its icons and Gifs from a DLL file that is associated with explorer.exe. The dll file that is required for the Background script processing of Internet Explorer is “shdoclc.dll” and is located in “C:\windows\system32\shdoclc.dll

Here are few thing i found out, when exploring the MS-IE. I have opened up the Dll file (shdoclc.dll),analyzed it and found some interesting stuffs, that would be really helpful for Browser Developers and Novice Hackers who want to play pranks with Newbies.

Note : This applies and works only on IE.

As everyone Knows about:blank is used to set the page Blank, likewise there are few other resources that are available for IE and can be fetched from the shdoclc.dll.

IE Fetches all the error codes as well as scripts and messages from shdoclc.dll,

Say If you are getting an error stating “HTTP Error 403 – Forbidden“, this message too is fetched from the shdoclc.dll, so what happens here incase of “Error 403 – Forbidden
” is that it will contact the “http_403.htm” file located in the dll, where you can access this manually just by typing the given URL in the address bar and hit enter.

res://shdoclc.dll/http_403.htm

Likewise it has error message and stuffs realted to the background processing of IE and here it is indexed below, just explore it and have fun……

Here you can Find the Icon and some Image files,

res://shdoclc.dll/end_inactive.gif
res://shdoclc.dll/pagerror.gif
res://shdoclc.dll/begin.gif
res://shdoclc.dll/back.gif
res://shdoclc.dll/refresh.gif
res://shdoclc.dll/search.gif
res://shdoclc.dll/flag.gif
res://shdoclc.dll/begin_hilite.gif
res://shdoclc.dll/lines.bmp
res://shdoclc.dll/ie.gif
res://shdoclc.dll/ie256.gif
res://shdoclc.dll/world.bmp
res://shdoclc.dll/world256.gif
res://shdoclc.dll/ie5.gif
res://shdoclc.dll/end.gif
res://shdoclc.dll/end_hilite.gif
res://shdoclc.dll/end_inactive.gif
res://shdoclc.dll/next.gif
res://shdoclc.dll/next_hilite.gif
res://shdoclc.dll/next_inactive.gif
res://shdoclc.dll/prev.gif
res://shdoclc.dll/prev_hilite.gif
res://shdoclc.dll/prev_inactive.gif
res://shdoclc.dll/printctl.gif
res://shdoclc.dll/printctl_hilite.gif
res://shdoclc.dll/zoom_inactive.gif
res://shdoclc.dll/zoomin.gif
res://shdoclc.dll/zoomin_hilite.gif
res://shdoclc.dll/zoomout.gif
res://shdoclc.dll/zoomout_hilite.gif
res://shdoclc.dll/page.gif
res://shdoclc.dll/link.gif
res://shdoclc.dll/image.gif

Here you can really explore few Interesting stuffs regarding error codes adn crash reporting and so on….

res://shdoclc.dll/privacypolicytransform.xsl
res://shdoclc.dll/about.dlg
res://shdoclc.dll/error.dlg
res://shdoclc.dll/ieerror.dlg
res://shdoclc.dll/navcancl.htm
res://shdoclc.dll/offcancl.htm
res://shdoclc.dll/findinc.dlg
res://shdoclc.dll/bidifind.dlg
res://shdoclc.dll/find.dlg
res://shdoclc.dll/privacypolicy.dlg
res://shdoclc.dll/policylooking.htm
res://shdoclc.dll/policynone.htm
res://shdoclc.dll/policyerror.htm
res://shdoclc.dll/policysyntaxerror.htm
res://shdoclc.dll/preview.dlg
res://shdoclc.dll/pstemplate.dlg
res://shdoclc.dll/anchrppg.ppg
res://shdoclc.dll/imageppg.ppg
res://shdoclc.dll/docppg.ppg
res://shdoclc.dll/analyze.dlg
res://shdoclc.dll/wcee.htm
res://shdoclc.dll/http_400.htm
res://shdoclc.dll/http_403.htm
res://shdoclc.dll/http_406.htm
res://shdoclc.dll/http_410.htm
res://shdoclc.dll/http_500.htm
res://shdoclc.dll/http_501.htm
res://shdoclc.dll/http_gen.htm
res://shdoclc.dll/servbusy.htm
res://shdoclc.dll/dnserror.htm
res://shdoclc.dll/syntax.htm
res://shdoclc.dll/orgfav.dlg
res://shdoclc.dll/printerr.htm
res://shdoclc.dll/printnf.htm
res://shdoclc.dll/printunk.htm
res://shdoclc.dll/printnof.htm

If you have your own Domain, you can trick the Hackers who try to access your Admin Login Page. Most of the Novice Hackers would try to access the admin login page by trying http://www.site.com/admin, so instead of real Login you can place a fake HTML page admin.html that contains a Link that says “Admin Login” and you can use the Anchor tag to link to the “res://shdoclc.dll/http_403.htm“, so that you can customize you error page easily without start designing from the scratch.

Try this just by copying and pasting it in the address bar of IE and hit enter to have fun with Internet Explorer.

Advertisements

4 Comments

Leave a Comment
  1. daeviydt / Jan 23 2009 10:28 am

    Please help me! You apparently know what you’re doing, and I really do not — I keep getting “res://shdoclc.dll/navcancl.htm” when I try to log into facebook — I viewed the source and I saw somewhere it said something about w3.org — I tried deleting cookies and restricting that site and a few other things I found on google but none of them worked — please help!

  2. technocrawl / Jan 23 2009 10:40 am

    The URL that you have noticed “res://shdoclc.dll/navcancl.htm” clearly states that the “Navigation to the Target Link has been cancelled due to some reasons”.
    Any of the below will help you in getting the page you want,..

    Check with the host file, that is located at “C:\WINDOWS\system32\drivers\etc\hosts” open it with Notepad, then check whether is there any URL that is realted to Facebook, if so then remove that, save it and then try navigating to the page.

    If this doesnt provide a solution, then you can download Mozilla Firefox and naviagte to the page you want and i m pretty sure that you wont get the same issue again.

  3. daeviydt / Jan 23 2009 11:23 am

    Thanks for your help. I downloaded Mozilla, but somehow the problem persisted. So I downloaded spyware removers, and the catastrophy continued… Anyway after installing and uninstalling a few different programs, following at least two dozen (sometimes contradicting) recommendations, and finally uninstalling and reinstalling IE7 — things seem to be working properly… now I have to worry about cleaning my computer from all the extra little left over junk from tonight’s operation!
    Thanks for your help — not to mention your unbelievably rapid (AND THOROUGH) response!

  4. fouras / Feb 11 2009 10:11 pm

    Hello,
    I have tried your hacks above; do you see a reason why, when I enter one of your commands above referring to a “.dlg” file, e.g. res://shdoclc.dll/about.dlg, I get a box asking whether I want to save the corresponding file (about in the example above); on another computer, it leads directly to the display within IE of what looks like a web page

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: