All Projects → SweetIceLolly → Huorong_vulnerabilities

SweetIceLolly / Huorong_vulnerabilities

Licence: mit
Huorong Internet Security vulnerabilities 火绒安全软件漏洞

Programming Languages

c
50402 projects - #5 most used programming language

Projects that are alternatives of or similar to Huorong vulnerabilities

Herpaderping
Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the intentions of a process.
Stars: ✭ 614 (+622.35%)
Mutual labels:  vulnerability, antivirus
Avpwn
List of real-world threats against endpoint protection software
Stars: ✭ 179 (+110.59%)
Mutual labels:  vulnerability, antivirus
Slowloris
Asynchronous Python implementation of SlowLoris DoS attack
Stars: ✭ 51 (-40%)
Mutual labels:  vulnerability
Winpayloads
Undetectable Windows Payload Generation
Stars: ✭ 1,211 (+1324.71%)
Mutual labels:  antivirus
Awesome Baseband Research
A curated list of awesome baseband research resources
Stars: ✭ 70 (-17.65%)
Mutual labels:  vulnerability
Vulnwhisperer
Create actionable data from your Vulnerability Scans
Stars: ✭ 1,102 (+1196.47%)
Mutual labels:  vulnerability
Hacker ezines
A collection of electronic hacker magazines carefully curated over the years from multiple sources
Stars: ✭ 72 (-15.29%)
Mutual labels:  vulnerability
Nugetdefense
An MSBuildTask that checks for known vulnerabilities. Inspired by OWASP SafeNuGet.
Stars: ✭ 44 (-48.24%)
Mutual labels:  vulnerability
Vulstudy
使用docker快速搭建各大漏洞靶场,目前可以一键搭建17个靶场。
Stars: ✭ 1,245 (+1364.71%)
Mutual labels:  vulnerability
Vulnerability Data Archive
With the hope that someone finds the data useful, we periodically publish an archive of almost all of the non-sensitive vulnerability information in our vulnerability reports database. See also https://github.com/CERTCC/Vulnerability-Data-Archive-Tools
Stars: ✭ 63 (-25.88%)
Mutual labels:  vulnerability
Cve 2018 20555
Social Network Tabs Wordpress Plugin Vulnerability - CVE-2018-20555
Stars: ✭ 78 (-8.24%)
Mutual labels:  vulnerability
Attack Surface Detector Burp
The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters
Stars: ✭ 63 (-25.88%)
Mutual labels:  vulnerability
Bitp0wn
Algorithms to re-compute a private key, to fake signatures and some other funny things with Bitcoin.
Stars: ✭ 59 (-30.59%)
Mutual labels:  vulnerability
Unjailme
A sandbox escape based on the proof-of-concept (CVE-2018-4087) by Rani Idan (Zimperium)
Stars: ✭ 73 (-14.12%)
Mutual labels:  vulnerability
Shellshockhunter
It's a simple tool for test vulnerability shellshock
Stars: ✭ 52 (-38.82%)
Mutual labels:  vulnerability
Avdetection
A simple way for detection the remote user's antivirus
Stars: ✭ 82 (-3.53%)
Mutual labels:  antivirus
Openvas Scanner
Open Vulnerability Assessment Scanner - Scanner for Greenbone Vulnerability Management (GVM)
Stars: ✭ 1,056 (+1142.35%)
Mutual labels:  vulnerability
Sap exploit
Here you can get full exploit for SAP NetWeaver AS JAVA
Stars: ✭ 60 (-29.41%)
Mutual labels:  vulnerability
Ossf Cve Benchmark
The OpenSSF CVE Benchmark consists of code and metadata for over 200 real life CVEs, as well as tooling to analyze the vulnerable codebases using a variety of static analysis security testing (SAST) tools and generate reports to evaluate those tools.
Stars: ✭ 71 (-16.47%)
Mutual labels:  vulnerability
Malice
VirusTotal Wanna Be - Now with 100% more Hipster
Stars: ✭ 1,253 (+1374.12%)
Mutual labels:  antivirus

火绒安全软件漏洞

描述

火绒安全软件的名声一直挺不错的(至少我看来),并且以查杀准确、快速而收到不少好评。但是我在测试的时候发现其自我防护还尚有欠缺,还望尽快修复。值得一提的是,这个仓库里面涉及到的技术并不深奥,并且有些漏洞甚至不需要管理员权限就能被利用。

警告

创建该仓库的目的是测试及学习用途。对于您如何使用这个仓库里的内容,本人概不负责。请不要把该仓库里的内容用于任何不正当的用途。您只应该在自己的设备上或者自己的虚拟机中测试该仓库里面涉及到的技术。

测试环境

火绒安全软件版本: 5.0.39.7

操作系统: Windows 10 1909 x64

官方回应

2020年3月17日: 将漏洞反馈给火绒官方

2020年3月19日: 官方确认漏洞

2020年3月31日: 官方指除了PromptBypass1以外的漏洞均在火绒安全5.0.41.0修复。对于PromptBypass1,官方指“窗口程序无法知道消息来源,所以无法过滤” (请见帖子)。

帖子: http://bbs.huorong.cn/thread-67135-1-1.html

漏洞

请进入文件夹查看对应漏洞的详情

文件夹 需要管理员权限 描述 已修复
KillHipsDaemon 火绒防护程序HipsDaemon.exe的自我保护漏洞 ×
KillTray1 火绒托盘程序HipsTray.exe的自我保护漏洞 ×
KillTray2 火绒托盘程序HipsTray.exe的自我保护漏洞
PromptBypass1 火绒的防护弹窗的漏洞 ×
PromptBypass2 火绒防护程序的通讯漏洞

Huorong Internet Security Vulnerabilities

Description

Huorong Internet Security has a good reputation (at least in my opinion) and it received a lot of praise for its accuracy and rapidity. However, during my testing, I found that there are still some flaws in its self-protection. I hope they can be repaired as soon as possible. It is worth mentioning that the technology involved in this repository is not difficult, and some vulnerability can be exploited even without administrative privilege.

Warning

This repository is created for testing and educational purposes. I do not take any responsibility for what you do with the contents in this repository. Do not use the contents of this repository for any improper purpose. You should only test the technology involved in this repository on your own equipment or in your virtual machine.

Testing Environment

Huorong Internet Security Version: 5.0.39.7

Operating System: Windows 10 1909 x64

Official Response

2020 Mar 17: Vulnerabilities reported to the official

2020 Mar 19: Vulnerabilities confirmed officially

2020 Mar 31: The official says that all vulnerabilities except PromptBypass1 are fixed in Huorong Internet Security version 5.0.41.0. As for PromptBypass1, the official says that "The window cannot detect the source of the message, thus it cannot be filtered" (Please see the post).

The post: http://bbs.huorong.cn/thread-67135-1-1.html

Vulnerabilities

Please enter the folders to see corresponding vulnerability details

Folder Administrative Privilege Required Description Repaired
KillHipsDaemon Yes Self-protection vulnerability of Huorong Internet Security daemon process HipsDaemon.exe ×
KillTray1 Yes Self-protection vulnerability of Huorong Internet Security Tray process HipsTray.exe ×
KillTray2 No Self-protection vulnerability of Huorong Internet Security Tray process HipsTray.exe
PromptBypass1 No Huorong popup prompt vulnerability ×
PromptBypass2 No Communication vulnerability of Huorong Internet Security
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].