Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #
- # This is configuration file for Security Software Testing Suite 64.
- #
- # You are advised to read this file carefully and modify these settings before testing.
- #
- #
- # Every line that starts with '#' is ignored. Blank lines are ignored.
- # Every line that contains '=' defines a variable. The last line must be blank.
- #
- #
- # The URL is used mostly by leak-tests. It contains the protocol, the domain and the location
- # of the target web page that is to be accessed by the test.
- #
- url=http://www.matousec.com/projects/proactive-security-challenge-64/test.php
- #
- # The domain is used mostly by leak-tests. It is a DNS name of the Internet server that is to be accessed.
- # The second level domain (domain2nd) should contain only two parts separated by a dot.
- #
- domain=www.matousec.com
- domain2nd=matousec.com
- #
- # The target web page is used mostly by leak-tests. It describes the location of the target web page
- # on the server that is specified by domain or IP.
- #
- page=/projects/proactive-security-challenge-64/test.php
- #
- # TCP/UDP IP address and target TCP/UDP port specify the target Internet server
- # for some TCP/UDP oriented tests, mostly leak-tests.
- #
- ip_tcp=46.28.105.86
- port_tcp=80
- ip_udp=192.168.1.1
- port_udp=53
- #
- # Address and port of external HTTP proxy server.
- #
- ip_proxy=192.168.1.1
- port_proxy=8080
- #
- # Raw IP address is used by some leak-tests that does not use TCP or UDP
- # for a communication with the Interet server.
- #
- ip_raw=46.28.105.86
- #
- # IP address of the local interface is used by some spying tests.
- #
- ip_loc=192.168.1.1
- #
- # Data are used mostly by leak-tests.
- # Short data (data46) may contain at most 46 characters.
- # The data are usually encoded and appended to the URL with a delimiter.
- #
- data=I have failed the test
- data46=I have failed this test.
- data_delimiter=?
- #
- # The pattern is searched among the incoming/read/received data.
- # If the pattern is found it usually means that the attack was successful.
- # pattern_net is used mostly by leak-tests.
- # pattern_sniff is used by some spying tests.
- #
- pattern_net=YOUR SYSTEM FAILED THIS TEST
- pattern_sniff=QWERTY
- #
- # The list of important processes, usually the processes of the tested product.
- # The first line determines the number of the processes in the list.
- # Then the names of the processes follows.
- # This list must be modified before testing.
- #
- processes=1
- ekrn.exe
- #
- # The list of important services and drivers, usually those that belong to the tested product.
- # The first line determines the number of the services and drivers in the list.
- # Then the names of the services and drivers follows.
- # This list must be modified before testing.
- #
- services=1
- ESET Service
- #
- # The list of files and directories, usually those that belong to the tested product.
- # The first line determines the number of the files and directories in the list.
- # Then the list of files and directories follows.
- # This list must be modified before testing.
- #
- files=1
- C:\Program Files\ESET\ESET Smart Security
- #
- # The list of registry entries, usually those that belong to the tested product.
- # The first line determines the number of the registry entries in the list.
- # Then the list of registry entries follows.
- # Registry values, unlike registry keys, are written in format "KEY_NAME\\VALUE_NAME".
- # These registry roots are valid: HKCR, HKCU, HKLM.
- # This list must be modified before testing.
- #
- registry=3
- HKEY_LOCAL_MACHINE\SOFTWARE\ESET
- HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\egui
- HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\ekrn
- #
- # This line must be modified before testing.
- # If you modify its value to "I DO AGREE" you do proclaim that
- # 1) you do understand the purpose of this testing suite,
- # 2) you have modified the settings properly to made your tests relevant,
- # 3) you do understand that it may damage your system or data,
- # 4) you do agree with the licence that is available in the original package
- # of SSTS64 in "licence.txt" file and you especially know that commercial
- # or business related usage of SSTS64 is not free.
- #
- agreement=I DO AGREE
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement