Overblog
Suivre ce blog Administration + Créer mon blog
KAV TEST Part 3

KAV TEST Part 3

CLIENT/SERVER SIDE ATTACKS and other tests: Here we focus on attacks which occur via client applications (browser for instance) and which may represent possible attack in case of intrusion. NB. Most of these tests have been done during the summer of 2006,...

Lire la suite

KAV TEST Part 2 Next

KAV TEST Part 2 Next

3) Malwares protection: a) Trojans and backdoors: -BasicBackdoor: P1/P2 KAV warns about rundll32 integrity violation: this can't really be considered as an alert in relation to a suspect or malicious activity. But even if the backdoor is not known from...

Lire la suite

KAV TEST PART 2

KAV TEST PART 2

PART 2: IN THE WILD WITH REAL MALWARES 1) Protection during the boot and before the shutdown a) keylogging protection with WinlogonHijack : P1/P2 P2 ("accès refusé"="access denied"): b) New program running at the boot: -keylogger: with Ardamax Keylogger....

Lire la suite

KAV TEST Part 1 Next

4) Registry protection -with Scoundrel Simulator (Run Keys): P1/P2 (4/5) -with RegTest1: P1/P2 -with RegHide (hidden key called 'can't touch me"): P1/P2 NB: Kav can prevent hidden key installation but is not able to detect already installed hidden key...

Lire la suite

Other MALWARES Part 13

Other MALWARES Part 13

Most of these malwares try to install themselves and are easily blocked by the "Trojan Generic" procative alert.Some malwares only open connections, and are not blocked by the proactive module (F1 results).Unfortunately, most .jpg has been lost for most...

Lire la suite

<< < 1 2 3