AV-Comparatives : Advanced focus offensive security tests

Discussion in 'other anti-virus software' started by Thankful, May 23, 2024.

  1. Thankful

    Thankful Savings Monitor

  2. Minimalist

    Minimalist Registered Member

    Interesting reports, thank you for sharing.
     
  3. xxJackxx

    xxJackxx Registered Member

    Unless I missed something, I assume they aren't revealing the ones that did not pass?
     
  4. Rasheed187

    Rasheed187 Registered Member

    What I wonder about is were these simulators or real life malware that were using these code injection methods? But good to know they were able to block almost all methods.
     
  5. IBK

    IBK AV Expert

    We do not use simulators.
     
  6. Rasheed187

    Rasheed187 Registered Member

    OK cool, but can you then tell me how did you test these AV's against code injection? I mean if malware runs and is caught by the AV, it will never get to perform code injection. Or am I misunderstanding?
     
  7. IBK

    IBK AV Expert

    In this test, we focused on evaluating various AV products against different process injection techniques. We crafted the samples in such a way that they bypassed both static and dynamic detections initially. This setup allowed us to specifically test whether the AV products could detect the execution or injection of the shellcode.
     
  8. Rasheed187

    Rasheed187 Registered Member

    Wait a minute, so you guys say you are able to bypass AV's? So I assume this means that hackers can do the same. But it's indeed an interesting way to test behavior blockers. I saw a video on the PC Security channel where Eset Internet Security 2024 was tested with real time protection disabled but the HIPS was still enabled and it failed to block a ransomware sample.
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice