1
Test Results
1. Default sample detection rate
Figure 2
Figure 3
Note: Bitdefender V2008 is similar to V2009, and its improvement mainly covers new features and other aspects.
F-Secure V2009 performs better than V2008. The Improvements mainly involve performance.
Figure 4
Microsoft and McAfee received a STANDARD rating this time, but both of them had the lowest false positive rate among these products.
McAfee's Artemis technology was not tested
(shortcut key window + e) to view all the computers that have been added. Shared items can be freely copied and pasted through the home group as long as they are selected when they are added. They are the same as moving and copying files locally.
PS:
1. All versions of Win7 can be added to the home group. However, only systems of Win7 home advanced edition and later can create a home group. If the computer is an ordinary Windows 7 Family version, you can use the Win7 upgrade key to first upgr
since the system was started) as the seed. It can only weaken the surface of violent attacks, and it is easy to predict.
Attack vector Reuse
During encryption, the algorithm uses the same attack vector (IV) for each file ).
Static Salt)
It uses static salt for encryption.
byte[]saltBytes=newbyte[]{1,2,3,4,5,6,7,8};
Sending key
The key is sent to the server through an unencrypted GET request.
//SendscreatedpasswordtargetlocationpublicvoidSendPassword(stringpassword){stringinfo=computerName+"-"
The path to confrontation between vulnerability exploitation and Kaspersky0x00 Thank you
I am particularly grateful to all of you for your support for your work this year. If you do not have any suggestions, you can only write some articles to make everyone happy. If you have any mistakes, please kindly point out, grateful!
First, thank you for your help:
Quange
No score
Instruder
My lovely colleagues
0x01 inscription:
The topic is about the confrontation between vulnerability exploitation and K
by a professional website. For details, refer:Http://www.virus.gr/english/fullxml/default.asp? Id = 62 MNU = 62
Top 20 anti-virus capabilities
1. F-Secure 5.41 total performance: 99.63%2. Kaspersky personal pro total performance: 99.35%3. antivirenkit (avk) 12.0.4 total performance: 98.67%4. McAfee 7.03.6000 total performance: 97.24%5. Raid antivirus desktop Tota performance: 94.26%6. F-Prot 3.14b total performance: 93.40%7. Norton 2004 Professional total performance: 92.35%8. Titan 2003 total
)
===/
After all these items are cleared, restart the computer and the message box is no longer displayed.
File Description: C:/root/yxyeaholes/scvhost.exeAttribute: ---Digital Signature: NoPE file: YesLanguage: Chinese (China)File version: 1.0.0.0Product Version: 1.0.0.0Creation Time:Modification time:Size: 478720 bytes, 467.512 KBMD5: 84e9c475ffe13cb7c8fd60f5b2995f00Sha1: bad9cfae6813748df9eb9bc0ad631628a267d2b2CRC32: cdee47b1
The file scvhost.exe was received at 2008.09.01 15:25:39 (CET)
Kapsersky reportsTrojan-PSW.Win32.OnLineGames.fqThe rising report isTrojan. mnless. LXV
In addition, C:/Documents and Settings/Administrator found that:
C:/Documents and Settings/Administrator/msinfo. vbs content:/---Set shell = Createobject ("wscript. Shell ")Shell. Run ("msinfo.exe ")Set shell = nothing---/
File Description: C:/Documents ents and settings/Administrator/msinfo.exeAttribute: ---An error occurred while obtaining the file version information!Creation Time: 8:50:55Modification tim
/down.exeAttribute: ---An error occurred while obtaining the file version information!Creation Time:Modification time:Access time:Size: 19602 bytes, 19.146 KBMD5: a329a121353d80b9871119788f7b14c7
Nspack 1.3-> North Star/Liu Xing Ping
File down.exe received at 09:14:12 (CET)
Current status: Completed
Anti-Virus engine
Version
Last update
Scan results
AhnLab-V3
2007.7.28.0
2007.07.27
Win-Trojan/hupigon. gen
AntiVir
7.4.0.50
2007.07.27
TR/agent
follows:/----------[Autorun]Open =./recycler/autorun.exe
Shell/1 = openShell/1/command =./recycler/autorun.exeShell/2/= BrowserShell/2/command =./recycler/autorun.exe
ShellExecute =./recycler/autorun.exe----------/A file named autorun.exe is hidden in the recycle bin.By using fccommand, autorun.exe is exactly the same as wincfgs.exe.
RisingWorm. usbspy..
Status: finished
Complete scanning result of "wincfgs.exe", received in virustotal at 09.12.2006, 06:40:13 (CET ).
Antivirus
Vers
Ranking of the world's anti-virus Engines
1. F-Secure version 5.41-99.63%
2. Kaspersky version 4.5.0.49-99.35%
3. avk version 12.0.4-98.67%
4. McAfee version 3.3.6000-97.24%
5. rav version 8.6.105-94.26%
6. F-Prot version 3.14a-93.40%
7. Norton version 2004 Professional-92.35%
8. Titan version 2003-90.41%
9. bullguard version 3.5-88.34%
10. BitDefender version 7.1.110-88.28%
11. Norton effecate version 8.00.9374-88.27%
12. Dr
key window + e) to view all the computers that have been added. Shared items can be freely copied and pasted through the home group as long as they are selected when they are added. They are the same as moving and copying files locally.
PS:
1. All versions of Win7 can be added to the home group. However, only systems of Win7 home advanced edition and later can create a home group. If the computer is an ordinary Windows 7 Family version, you can use the Win7 upgrade key to first upgrade the Wi
, WINBASE. dll will load 2 additional DLLs into the address space of the system process services.exe: basesvc. dll and syicon. dll.
After dropping and loading the aforementioned DLLs, the worm will collect system information from the compromised computer, collect passwords from the Windows Protected Storage and Outlook Express passwords cache, and post collected details to a remote host. the details are posted in an encrypted form, by using AES (Rijndael) encryption.
The collected information
Environment: one computer in win7 (BitDefender Internet Security 2010) and one computer in XP (360 sets), connected with tplink and modern
Some time ago, my home computer suddenly failed to access the Internet. Windows 7 system Computers always reported ARP attacks, while Windows XP Always reported DNS and ARP attacks. I have found many ways on the Internet. The most frightening thing is to format the computer and then talk about anti-virus. If bit
learnt that the virus exploits the Remote Code execution Vulnerability (CVE-2018-7600) in the updated version of Drupal published March 8, 2018. The new virus has been attacked in various forms since it was discovered in early April. If this virus is infected, it will bind to the server and start launching the Salomon mining program called "Kkworker".4. Botnet is still active in the event of device restartSecurity researchers found the first IoT zombie virus that stops the system after a device
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.