H
hjlbx
Thread author
Hello,
Malicious scripts are one of the greatest security threats.
Each AV handles them in different ways.
Here is what I have observed when testing various AV against malicious scripts:
NOTE:
Interpreter = cmd.exe, wscript.exe, cscript.exe, java.exe, javaw.exe, javaws.exe, powershell.exe, powershell_ISE.exe...
Comodo Internet Security
Kaspersky Internet Security
Webroot
If anyone sees any mistakes let me know; I will correct.
* * * * *
Please add your AV of choice.
Malicious scripts are one of the greatest security threats.
Each AV handles them in different ways.
Here is what I have observed when testing various AV against malicious scripts:
NOTE:
Interpreter = cmd.exe, wscript.exe, cscript.exe, java.exe, javaw.exe, javaws.exe, powershell.exe, powershell_ISE.exe...
Comodo Internet Security
- Signature detection
- Unknown scripts are "Run Virtually" sandboxed by default (user can further restrict script access rights within the virtual sandbox)
- HIPS alert (must be enabled by user)
- Firewall alert for the specific script file when it makes outbound connection (user has option to block all Unrecognized files by default)
- Real-time protection frequently detects dropped files\hidden malicious download (us. temp\data folders)*
- Viruscope can reverse some script actions
- Default-Deny configuration will block all Unrecognized files**, including scripts
Kaspersky Internet Security
- Signature detection
- No virtual sandbox
- Will contain Unrecognized scripts with Low or High Restricted access to system resources
- HIPS alert
- Firewall alert only for the interpreter - but only if user creates "Prompt" firewall rule for that interpreter for outbound connections
- Real-time protection frequently detects dropped files\hidden malicious download (us. temp\data folders)**
- System Watcher does not reverse script actions
- Default-Deny configuration* will block all Unrecognized files, including scripts
Webroot
- Signature detection
- No virtual sandbox
- Unknown script will be monitored for malicious activity; might be terminated and rolled-back automatically - or - user can block and reverse
- No firewall alert
- Real-time protection frequently detects dropped files\hidden malicious download (us. temp\data folders)**
- Default-Deny configuration will block any script not rated as "Safe" in Webroot Intelligence Network
- Signature detection
- No virtual sandbox
- No HIPS
- No firewall alert
- Real-time protection frequently detects dropped files\hidden malicious download (us. temp\data folders)**
- No block and reverse possible
- No Default-Deny configuration possible
If anyone sees any mistakes let me know; I will correct.
* * * * *
Please add your AV of choice.
Last edited by a moderator: