Internet Exploiter


  03 February 2004


Exploits the fact that Microsoft Internet Explorer had a problem (fixed in this patch) where a cleverly constructed URL could appear to go to one site and actually take you to another.

Submitted by .


<a href= =01 %01 %00@></a>


1. This looks like:

2. Notice the use of =01 quoted-printable encoding to insert a non-printable ASCII character SOH (01) inside the URL.

3. Notice the use of % encoding to also insert the non-printable ASCII characters 01 and 00 (the latter being a standard string termination in C designed to fool filters that 'printf' the URL).

4. Notice the use of a URL username/password combination (cf Enigma/Bogus Login tricks).

5. This appears to take the user to, but actually goes to the site at

6. In Microsoft Internet Explorer both the text highlighted in the URL and the URL shown in the status bar indicate that the URL as on

7. Mozilla Firebird is also fooled by this trick, it terminates the URL at the SOH character.

Another variant has appeared in phishing emails. The pipe character | can be used in a URL. Under Internet Explorer the URL will not be displayed past the pipe. This can be used to make a subdomain look like a top-level domain. In the following example, borrowed from Netcraft|

the link will appear as in Internet Explorer, but in fact goes to


A small area

Spammers compendium entry - A small area

Ignore the smallprint

Spammers compendium entry - Ignore the smallprint

Script in the middle

Spammers compendium entry - Script in the middle

The Responsibility Transfer

Spammers compendium entry - The Responsibility Transfer

Colored Matrix

Spammers compendium entry - Colored Matrix