Content deleted Content added
No edit summary |
Patent citation |
||
(33 intermediate revisions by 28 users not shown) | |||
Line 1:
{{Short description|Microsoft Windows program}}
{{
| name = HTML Application (HTA)
| icon =
Line 23 ⟶ 24:
| standard =
| free =
| url = {{URL|1=https://
}}
An '''HTML Application''' ('''HTA''') is a [[Microsoft Windows]] program whose source code consists of [[HTML]], [[Dynamic HTML]], and one or more scripting languages supported by [[Internet Explorer]], such as [[VBScript]] or
The usual file extension of an HTA is <code>.hta</code>.
The ability to execute HTAs was introduced to Microsoft Windows in 1999, along with the release of [[Microsoft Internet Explorer 5]].<ref>[http://support.microsoft.com/kb/200874 ''Article ID:200874 in Microsoft Support''], in Microsoft Support Knowledge Base</ref> On December 9, 2003, this technology was [[patent]]ed.<ref>
== Uses ==
Line 43 ⟶ 44:
An HTA is treated like any executable file with extension [[EXE|<code>.exe</code>]]. When executed via mshta.exe (or if the file icon is double-clicked), it runs immediately. When executed remotely via the browser, the user is asked once, before the HTA is downloaded, whether or not to save or run the application; if saved, it can simply be run on demand after that.<ref name=msintro/>
By default, HTAs are rendered as per "standards-mode content in IE7 Standards mode and quirks mode content in IE5 (Quirks) mode", but this can be altered using <code>X-UA-Compatible</code> headers.<ref name=msintro>{{cite web |url=https://msdn.microsoft.com/en-us/library/ms536496%28v=vs.85%29.aspx#Compatibility |title=Introduction to HTML Applications (HTAs).|website=
HTAs are fully supported running in modes equivalent to Internet Explorer
===Security considerations===
Line 63 ⟶ 64:
==Vulnerabilities==
HTA have been used to deliver malware.<ref>{{Cite web|url=https://www.vmray.com/cyber-security-blog/spora-ransomware-dropper-hta-infect-system/|title=Spora Ransomware Dropper Uses HTA to Infect System|date=2017-01-17|website=VMRay|language=en-US|access-date=2018-12-22}}</ref><ref>{{Cite web|url=https://blog.netwrix.com/2017/06/01/nine-scariest-ransomware-viruses/|title=8 Scariest Ransomware Viruses|language=en-US|access-date=2018-12-22}}</ref> One particular HTA, named ''[[4chan]].hta'' (detected by antiviruses as JS/Chafpin.gen), was widely distributed by the users of the imageboard as a [[steganographic]] image in which the user were instructed to download the picture as an HTA file, which when executed, would cause the computer to automatically spam the website (evading 4chan's [[CAPTCHA]] in the process) with alternate variants of itself; it was reported that such attacks were previously delivered in which the user was prompted to save it as a [[JavaScript|.js]] file.<ref>{{cite web |last1=Constantin |first1=Lucian |title=4chan Flood Script Is Back with New Social Engineering Trick |url=https://news.softpedia.com/news/4chan-Flood-Script-Is-Back-with-New-Social-Engineering-Trick-151603.shtml |website=Softpedia |access-date=2021-11-09 |date=2010-08-10}}</ref>
==Example==
This is an example of [["Hello, World!" program|Hello World]] as an HTML Application.
<syntaxhighlight lang="
<HTML>
<HEAD>
<HTA:APPLICATION ID="HelloExample"
BORDER="
BORDERSTYLE="complex"/>
<TITLE>HTA - Hello World</TITLE>
Line 83 ⟶ 84:
== See also ==
*[[
*[[Active Scripting]]
*[[Apache Cordova]]
*[[Chromium Embedded Framework]]
*[[Electron (software framework)]]
*[[Firefox OS]]
*[[React Native]]
*[[XAML Browser Applications]] (XBAPs)
*[[XUL]] and [[XULRunner]] - a language and environment for Mozilla cross-platform applications that resembles the mechanism of HTML Applications.
*[[
==References==
{{
==External links==
Line 102 ⟶ 105:
{{Internet Explorer}}
[[Category:
[[Category:Internet Explorer]]
[[Category:
[[Category:Widget engines]]
|