AV-Comparatives : Advanced focus offensive security tests

Discussion in 'other anti-virus software' started by Thankful, May 23, 2024.

  1. Thankful

    Thankful Savings Monitor

    Joined:
    Feb 28, 2005
    Posts:
    6,605
    Location:
    New York City
  2. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,887
    Location:
    Slovenia, EU
    Interesting reports, thank you for sharing.
     
  3. xxJackxx

    xxJackxx Registered Member

    Joined:
    Oct 23, 2008
    Posts:
    8,740
    Location:
    USA
    Unless I missed something, I assume they aren't revealing the ones that did not pass?
     
  4. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,711
    Location:
    The Netherlands
    What I wonder about is were these simulators or real life malware that were using these code injection methods? But good to know they were able to block almost all methods.
     
  5. IBK

    IBK AV Expert

    Joined:
    Dec 22, 2003
    Posts:
    1,888
    Location:
    Innsbruck (Austria)
    We do not use simulators.
     
  6. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,711
    Location:
    The Netherlands
    OK cool, but can you then tell me how did you test these AV's against code injection? I mean if malware runs and is caught by the AV, it will never get to perform code injection. Or am I misunderstanding?
     
  7. IBK

    IBK AV Expert

    Joined:
    Dec 22, 2003
    Posts:
    1,888
    Location:
    Innsbruck (Austria)
    In this test, we focused on evaluating various AV products against different process injection techniques. We crafted the samples in such a way that they bypassed both static and dynamic detections initially. This setup allowed us to specifically test whether the AV products could detect the execution or injection of the shellcode.
     
  8. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,711
    Location:
    The Netherlands
    Wait a minute, so you guys say you are able to bypass AV's? So I assume this means that hackers can do the same. But it's indeed an interesting way to test behavior blockers. I saw a video on the PC Security channel where Eset Internet Security 2024 was tested with real time protection disabled but the HIPS was still enabled and it failed to block a ransomware sample.
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.