本帖最后由 ELOHIM 于 2015-8-14 23:42 编辑
Select a test payload... You may wish to try each test systematically. Ideally, all tests should be blocked by your anti-malware defences. If a blank window loads, then it likely was not detected/prevented.
The official EICAR.COM anti-virus test file.
This is a 16bit DOS COM file and cannot
run on recent OSes, but should be detected.
|
All Windows NT/95/98/2000/XP IE3+
Internet Explorer Windows OLE Automation Array (pre XP) CVE- 2014-6332
|
All Windows 2003/Vista/2008/7/8/10 IE6+
Internet Explorer Windows OLE Automation Array (post XP) CVE- 2014-6332
|
win32 (Java 7 JRE/JDK) Chrome Firefox IE
Java 7 Applet Remote Code Execution (Browser Independent) CVE- 2012-4681
|
win32 NT/XP/2003 IE6
MS03-020 Internet Explorer's handling of the OBJECT type attribute CVE- 2003-0344
|
win32 XP IE6
MS05-054 Microsoft Internet Explorer JavaScript OnLoad Handler CVE- 2005-1790
|
win32 XP/Vista IE7
Internet Explorer 7 CFunctionPointer Uninitialized Memory Corruption CVE- 2009-0075
|
win32 IE6
Internet Explorer Style getElementsByTagName Memory Corruption CVE- 2009-3672
|
win32 IE6
Internet Explorer CSS SetUserClip Memory Corruption CVE- 2010-3962
|
Windows
Firefox 5.0 to 15.0.1
exposedProps CVE- 2012-3993
|
Windows VLC v1.1.4 to 1.1.8
Browser Independent
AMV invalid pointer CVE- 2010-3275
|
Hacking Team July 2015 data leak
Adobe Flash 18.0.0.194
Use After Free CVE- 2015-5119
|
Elohim加注:java和firefox两个需要java集成环境和firefox浏览器支持。没有这两个程序不会报毒。个别测试需要IE低版本,比如IE 7。Adobe Flash Hacking Team leak 需要启用flashplayer加载项。
-------------------------------------------------------------------------------------------------------------------------
微软:
不报毒的有:MS09-002 (需要IE 7。IE 8加载提示错误,未结束的字符串常量)
MS03-020 (打开乱码,可能需要IE 6)
Java JRE 1.7 Applet (需要JAVA集成环境)
Firefox 5.0 - 15.0.1 exposedProps (需要firefox) |