<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>从 CVE-2016-0165 说起：分析、利用和检测（上）</title>
        <link>https://xiaodaozhi.com/exploit/32.html</link>
        <description>本文将对 CVE-2016-0165 (MS16-039) 漏洞进行一次简单的分析，并尝试构造其漏洞利用和内核提权验证代码，以及实现对应利用样本的检测逻辑。分析环境为 Windows 7 x86 SP1 基础环境的虚拟机，配置 1.5GB 的内存。</description>
        <lastBuildDate>Fri, 08 Jun 2018 04:00:00 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>https://github.com/jpmonette/feed</generator>
        <language>zh-CN</language>
        <image>
            <title>从 CVE-2016-0165 说起：分析、利用和检测（上）</title>
            <url>https://xiaodaozhi.com/uploads/2018/01/24/1773742729707.png</url>
            <link>https://xiaodaozhi.com/exploit/32.html</link>
        </image>
        <copyright>All rights reserved 2026</copyright>
        <atom:link href="https://xiaodaozhi.com/feed/exploit/32.html" rel="self" type="application/rss+xml"/>
    </channel>
</rss>