Advertisement
Guest User

ESET PSC64 Config

a guest
Nov 9th, 2014
347
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.15 KB | None | 0 0
  1. #
  2. # This is configuration file for Security Software Testing Suite 64.
  3. #
  4. # You are advised to read this file carefully and modify these settings before testing.
  5. #
  6. #
  7. # Every line that starts with '#' is ignored. Blank lines are ignored.
  8. # Every line that contains '=' defines a variable. The last line must be blank.
  9. #
  10.  
  11.  
  12. #
  13. # The URL is used mostly by leak-tests. It contains the protocol, the domain and the location
  14. # of the target web page that is to be accessed by the test.
  15. #
  16. url=http://www.matousec.com/projects/proactive-security-challenge-64/test.php
  17.  
  18.  
  19. #
  20. # The domain is used mostly by leak-tests. It is a DNS name of the Internet server that is to be accessed.
  21. # The second level domain (domain2nd) should contain only two parts separated by a dot.
  22. #
  23. domain=www.matousec.com
  24. domain2nd=matousec.com
  25.  
  26.  
  27. #
  28. # The target web page is used mostly by leak-tests. It describes the location of the target web page
  29. # on the server that is specified by domain or IP.
  30. #
  31. page=/projects/proactive-security-challenge-64/test.php
  32.  
  33.  
  34. #
  35. # TCP/UDP IP address and target TCP/UDP port specify the target Internet server
  36. # for some TCP/UDP oriented tests, mostly leak-tests.
  37. #
  38. ip_tcp=46.28.105.86
  39. port_tcp=80
  40.  
  41. ip_udp=192.168.1.1
  42. port_udp=53
  43.  
  44.  
  45. #
  46. # Address and port of external HTTP proxy server.
  47. #
  48. ip_proxy=192.168.1.1
  49. port_proxy=8080
  50.  
  51.  
  52. #
  53. # Raw IP address is used by some leak-tests that does not use TCP or UDP
  54. # for a communication with the Interet server.
  55. #
  56. ip_raw=46.28.105.86
  57.  
  58.  
  59. #
  60. # IP address of the local interface is used by some spying tests.
  61. #
  62. ip_loc=192.168.1.1
  63.  
  64.  
  65. #
  66. # Data are used mostly by leak-tests.
  67. # Short data (data46) may contain at most 46 characters.
  68. # The data are usually encoded and appended to the URL with a delimiter.
  69. #
  70. data=I have failed the test
  71. data46=I have failed this test.
  72. data_delimiter=?
  73.  
  74.  
  75. #
  76. # The pattern is searched among the incoming/read/received data.
  77. # If the pattern is found it usually means that the attack was successful.
  78. # pattern_net is used mostly by leak-tests.
  79. # pattern_sniff is used by some spying tests.
  80. #
  81. pattern_net=YOUR SYSTEM FAILED THIS TEST
  82. pattern_sniff=QWERTY
  83.  
  84.  
  85. #
  86. # The list of important processes, usually the processes of the tested product.
  87. # The first line determines the number of the processes in the list.
  88. # Then the names of the processes follows.
  89. # This list must be modified before testing.
  90. #
  91. processes=1
  92. ekrn.exe
  93.  
  94.  
  95. #
  96. # The list of important services and drivers, usually those that belong to the tested product.
  97. # The first line determines the number of the services and drivers in the list.
  98. # Then the names of the services and drivers follows.
  99. # This list must be modified before testing.
  100. #
  101. services=1
  102. ESET Service
  103.  
  104.  
  105. #
  106. # The list of files and directories, usually those that belong to the tested product.
  107. # The first line determines the number of the files and directories in the list.
  108. # Then the list of files and directories follows.
  109. # This list must be modified before testing.
  110. #
  111. files=1
  112. C:\Program Files\ESET\ESET Smart Security
  113.  
  114.  
  115. #
  116. # The list of registry entries, usually those that belong to the tested product.
  117. # The first line determines the number of the registry entries in the list.
  118. # Then the list of registry entries follows.
  119. # Registry values, unlike registry keys, are written in format "KEY_NAME\\VALUE_NAME".
  120. # These registry roots are valid: HKCR, HKCU, HKLM.
  121. # This list must be modified before testing.
  122. #
  123. registry=3
  124. HKEY_LOCAL_MACHINE\SOFTWARE\ESET
  125. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\egui
  126. HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\ekrn
  127.  
  128.  
  129. #
  130. # This line must be modified before testing.
  131. # If you modify its value to "I DO AGREE" you do proclaim that
  132. # 1) you do understand the purpose of this testing suite,
  133. # 2) you have modified the settings properly to made your tests relevant,
  134. # 3) you do understand that it may damage your system or data,
  135. # 4) you do agree with the licence that is available in the original package
  136. # of SSTS64 in "licence.txt" file and you especially know that commercial
  137. # or business related usage of SSTS64 is not free.
  138. #
  139. agreement=I DO AGREE
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement