Skip to content

Commit fc9b43a

Browse files
fix: update prompt styling for clarity in SilverFox POC documentation
1 parent 00860a8 commit fc9b43a

File tree

2 files changed

+7
-7
lines changed

2 files changed

+7
-7
lines changed

_posts/2025-12-15-silver-fox-poc-2025-zh-cn.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ Python 社区已经提供了现成的库:[PythonMemoryModule](https://github.c
4747
导入此库后,即可将任意 DLL/EXE 加载进 `python.exe` 宿主进程的内存中。
4848

4949
> 经过本地测试,C/C++ 编译的 EXE 可以完美运行,但 .NET 程序无法正常工作。
50-
{: .prompt-tip }
50+
{: .prompt-warning }
5151

5252
```python
5353
import pythonmemorymodule
@@ -193,7 +193,7 @@ if (result == ERROR_SUCCESS) {
193193
![alt text](3.png)
194194

195195
> 至此,该驱动可以在开启了 HVCI (Hypervisor-Protected Code Integrity) 的最新版 Windows 11 机器上成功运行。
196-
{: .prompt-info }
196+
{: .prompt-tip }
197197

198198
下面是 POC 的关键代码片段:
199199

@@ -431,7 +431,7 @@ int InvokeCreateSvcRpcMain(char* pExecCmd)
431431
2024 年底,安全研究员 **Jonathan Beierle** 和 **Logan Goins** 发布了一篇名为 [Weaponizing WDAC - Killing the Dreams of EDR](https://beierle.win/2024-12-20-Weaponizing-WDAC-Killing-the-Dreams-of-EDR/) 的文章,详细描述了如何滥用 WDAC 机制来禁用杀毒软件和 EDR 的运行。
432432
433433
> 这一攻击手法的核心关键点在于:**WDAC 策略在系统启动阶段的加载优先级高于 EDR 驱动程序**。
434-
{: .prompt-info }
434+
{: .prompt-danger }
435435
436436
### 攻击流程
437437

_posts/2025-12-15-silver-fox-poc-2025.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ The Python community has provided a ready-made library: [PythonMemoryModule](htt
4747
After importing this library, any DLL/EXE can be loaded into the memory of the `python.exe` host process.
4848

4949
> After local testing, EXEs compiled with C/C++ run perfectly, but .NET programs do not work properly.
50-
{: .prompt-tip }
50+
{: .prompt-warning }
5151

5252
```python
5353
import pythonmemorymodule
@@ -192,8 +192,8 @@ According to a [report](https://research.checkpoint.com/2025/silver-fox-apt-vuln
192192

193193
![alt text](3.png)
194194

195-
> At this point, this driver can successfully run on the latest Windows 11 machines with HVCI (Hypervisor-Protected Code Integrity) enabled.
196-
{: .prompt-info }
195+
> At this point, the driver can successfully run on the latest Windows 11 machines with HVCI (Hypervisor-Protected Code Integrity) enabled.
196+
{: .prompt-tip }
197197

198198
Below is the key code snippet of the POC:
199199

@@ -431,7 +431,7 @@ According to [Huorong Security's report](https://www.huorong.cn/document/tech/vi
431431
In late 2024, security researchers **Jonathan Beierle** and **Logan Goins** published an article titled [Weaponizing WDAC - Killing the Dreams of EDR](https://beierle.win/2024-12-20-Weaponizing-WDAC-Killing-the-Dreams-of-EDR/), detailing how to abuse the WDAC mechanism to disable the operation of antivirus software and EDR.
432432
433433
> The core key point of this attack method is: **WDAC policies have a higher loading priority than EDR drivers during the system boot phase**.
434-
{: .prompt-info }
434+
{: .prompt-danger }
435435
436436
### Attack Process
437437

0 commit comments

Comments
 (0)