搜索
123
返回列表 发新帖
楼主: 天耀群星
收起左侧

[讨论] 你的电脑clt得多少分?

[复制链接]
huang1111
发表于 2019-5-17 19:06:30 | 显示全部楼层
kis

1. RootkitInstallation: MissingDriverLoad        Protected
2. RootkitInstallation: LoadAndCallImage        Protected
3. RootkitInstallation: DriverSupersede        Protected
4. RootkitInstallation: ChangeDrvPath        Vulnerable
5. Invasion: Runner        Protected
6. Invasion: RawDisk        Vulnerable
7. Invasion: PhysicalMemory        Protected
8. Invasion: FileDrop        Vulnerable
9. Invasion: DebugControl        Protected
10. Injection: SetWinEventHook        Vulnerable
11. Injection: SetWindowsHookEx        Vulnerable
12. Injection: SetThreadContext        Protected
13. Injection: Services        Vulnerable
14. Injection: ProcessInject        Protected
15. Injection: KnownDlls        Vulnerable
16. Injection: DupHandles        Protected
17. Injection: CreateRemoteThread        Protected
18. Injection: APC dll injection        Protected
19. Injection: AdvancedProcessTermination        Protected
20. InfoSend: ICMP Test        Protected
21. InfoSend: DNS Test        Vulnerable
22. Impersonation: OLE automation        Protected
23. Impersonation: ExplorerAsParent        Protected
24. Impersonation: DDE        Vulnerable
25. Impersonation: Coat        Vulnerable
26. Impersonation: BITS        Protected
27. Hijacking: WinlogonNotify        Protected
28. Hijacking: Userinit        Vulnerable
29. Hijacking: UIHost        Protected
30. Hijacking: SupersedeServiceDll        Vulnerable
31. Hijacking: StartupPrograms        Vulnerable
32. Hijacking: ChangeDebuggerPath        Protected
33. Hijacking: AppinitDlls        Vulnerable
34. Hijacking: ActiveDesktop        Protected
Score        200/340
实机跑的
Yannis
发表于 2019-6-1 16:25:38 | 显示全部楼层
本帖最后由 Yannis 于 2019-6-1 18:11 编辑

Win疼! LTSC2019 & Comodo12
COMODO LEAKTESTS V.1.1.0.3
Date        16:18:12 - 2019/6/1
OS        Windows Vista SP0 build 9200
1. RootkitInstallation: MissingDriverLoad        Protected
2. RootkitInstallation: LoadAndCallImage        Protected
3. RootkitInstallation: DriverSupersede        Protected
4. RootkitInstallation: ChangeDrvPath        Vulnerable
5. Invasion: Runner        Protected
6. Invasion: RawDisk        Protected
7. Invasion: PhysicalMemory        Protected
8. Invasion: FileDrop        Protected
9. Invasion: DebugControl        Protected
10. Injection: SetWinEventHook        Vulnerable
11. Injection: SetWindowsHookEx        Protected
12. Injection: SetThreadContext        Protected
13. Injection: Services        Protected
14. Injection: ProcessInject        Protected
15. Injection: KnownDlls        Protected
16. Injection: DupHandles        Protected
17. Injection: CreateRemoteThread        Protected
18. Injection: APC dll injection        Protected
19. Injection: AdvancedProcessTermination        Protected
20. InfoSend: ICMP Test        Protected
21. InfoSend: DNS Test        Protected
22. Impersonation: OLE automation        Protected
23. Impersonation: ExplorerAsParent        Protected
24. Impersonation: DDE        Protected
25. Impersonation: Coat        Protected
26. Impersonation: BITS        Error
27. Hijacking: WinlogonNotify        Protected
28. Hijacking: Userinit        Protected
29. Hijacking: UIHost        Protected
30. Hijacking: SupersedeServiceDll        Protected
31. Hijacking: StartupPrograms        Protected
32. Hijacking: ChangeDebuggerPath        Protected
33. Hijacking: AppinitDlls        Protected
34. Hijacking: ActiveDesktop        Error
Score        300/340
BBCALL
发表于 2019-6-14 11:38:26 | 显示全部楼层
本帖最后由 BBCALL 于 2019-6-14 11:39 编辑

很久前的东西了,虽不能完全满足现在的形势,但如果得分还是那么低的话,表示防护的水准还是那么低,如果得满分的话,代表任何正常或有毒的玩意都要死光光。
gbx972
发表于 2019-7-31 22:18:55 | 显示全部楼层
从来都是满分
温馨小屋
发表于 2019-8-6 19:50:32 | 显示全部楼层
BD 测试完第7项就被ATD杀了。。。


捕获.PNG
捕获0.PNG
您需要登录后才可以回帖 登录 | 快速注册

本版积分规则

手机版|杀毒软件|软件论坛|卡饭乐购| 卡饭论坛

Copyright © KaFan  KaFan.cn All Rights Reserved.

Powered by Discuz! X3.4( 苏ICP备07004770号 ) GMT+8, 2019-10-17 11:39 , Processed in 0.067788 second(s), 18 queries .

快速回复 返回顶部 返回列表