language.pagemalwaremenutitle = "Malware"
language.pagemalwaremenumalwareeicarc = "Malware EICAR C"
language.pagemalwaremenumalwareeicarcsharp = "Malware Eicar C#"
language.pagemalwaremenumalwareeicarcsandbox = "Malware Sandbox"
language.pagesslmenutitle = "SSL / TLS"
language.pagesslmenuconfigrace = "SSLv Config Race"
language.pagesslmenueicar = "SSL With Eicar Test"
language.pagesslmenudlp = "SSL With DLP Test"
language.pagesslmenudowngrade = "SSL Downgrade Test"
language.pagemiscmenutitle = "Misc"
language.pagemiscmenuclueboat = "The Clue Boat"
language.pagemiscmenuzippedfiles = "Zipped Files"
language.pagemiscmenuhttpupload = "HTTP Upload"
language.pagemiscmenuheaders = "HTTP Headers"
language.languageidentifydesc = "To help us understand your needs, please identify as either:";
language.languageidentifyemployee = "Employee Name"
language.languageidentifyorganisation = "Organiistion"
language.languagemisctitle = "The 7 blessings toolbox"
language.languagemiscaboutbody = "A simple toolbox to demonstarte, test, and validate.
Domain name in tribute to my south african friend blessing, may his inappropriate shoulder stroking haunt others like it haunted me.
Created by andy shepherd"
language.languagemiscabout = "About"
language.languagemiscwhat = "What?"
language.languagemischowtouse = "How to use?"
language.languagemiscwhyuseit = "Why use it?"
language.languagemiscdownloadnew = "Download New"
language.languagemisclastfiles = "Download Previous"
language.languagemiscfile = "Files"
language.languagemiscmd5hash = "MD5 Hash"
language.languagemisccreated = "Created"
language.languagemiscsize = "Size"
language.languagemiscbytes = "Bytes"
language.languagemiscsourcecode = "Sourcecode"
language.languagemiscdetails = "Details"
language.languagemiscdownload = "Download"
language.languagemiscoutput = "Output"
language.languagemalwareeicarcheader = "Malware Eicar C"
language.languagemalwareeicarcgrnwwarning = "This is written (by john payne) in pure c, it does *not* require dot net !"
language.languagemalwareeicarcwhat = "A freshly generated 100% benign compiled exe that mimics behaviour actions of real malware. as the malware is generated frequently, the hash should already not be known to any security tool."
language.languagemalwareeicarchowtouse = "Download this file on the target computer and investigate in the security tools.
Hash based tools should not detect it.
Sandbox tools should detonate and detect.
if you have an inline realtime blocking tool, this file should not get delivered."
language.languagemalwareeicarcwhyuseit ="* Demonstrate the value of real time detonation vs hash based technologies.
* Test your deployment, 1 click proves that the integrations are talking together
* Use over https to test decryption configurations"
language.languagemalwareeicarcdownloadnew = "Click here to generate a new safe 'malware' file, and download."
language.languagemalwareeicarcsharpheader = "Malware Eicar C#"
language.languagemalwareeicarcsharredwwarning = "Warning : Due to the compiler (MONO/MCS), these files require a 'Microsoft DotNet 4.5' environment to execute."
language.languagemalwareeicarcsharpwhat = "A freshly generated 100% benign compiled exe that mimics behaviour actions of real malware. As the malware is generated frequently, the hash should already not be known to any security tool."
language.languagemalwareeicarcsharphowtouse = "Download this file on the target computer and investigate in the security tools.
Hash based tools should not detect it.
Sandbox tools should detonate and detect.
If you have an inline realtime blocking tool, this file should not get delivered."
language.languagemalwareeicarcsharpwhyuseit = "* Demonstrate the value of real time detonation vs hash based technologies.
* Test your deployment, 1 click proves that the integrations are talking together
* Use over HTTPs to test decryption configurations"
language.languagemalwareeicarcsharpdownloadnew = "Click here to generate a new safe 'malware' file, and download."
language.languagepafishheader = "Malware Sandbox (Pafish)"
language.languagepafishpreface = "Many thanks to https://github.com/a0rtega/pafish for your work!"
language.languagepafishwhat = "Generated 100% benign compiled exe that mimics behaviour actions of real malware.
As the malware is generated frequently, the hash should already not be known to any security tool.
This tool differs from the above as it detonates in a Sandbox, and not the full iVM making it ideal for testing and showing MASS."
language.languagepafishhowtouse = "Download this file on the target computer and investigate in the security tools.
Hash based tools should not detect it.
Sandbox tools should detonate and detect.
If you have an inline realtime blocking tool, this file should not get delivered."
language.languagepafishwhyuseit = "* Demonstrate the value of real time detonation vs hash based technologies.
* Demonstrate security delivere to devices using Cloud proxy
* Use over HTTPs to test decryption configurations"
language.languagempafishdownloadnew = "Click here to generate a new safe 'malware' file, and download."
language.languagesslconfigraceheader = "SSLV Configuration Race"
language.languagesslconfigraceredwwarning = ""
language.languagesslconfigracewhat = "A short video to show how quick the SSLv can be configured."
language.languagesslconfigracehowtouse = "Simply play the video to the client."
language.languagesslconfigracewhyuseit = "Many technologies are described as 'quick to configure', this is proof.
This is ideal when demonstrating the ease of use of SSLv compared to it's main competitors."
language.languagesslconfigracedownloadnew = ""
language.languageclueboatheader = "The Clue Boat Challenge"
language.languageclueboatredwarning = "Read the warning entry page before proceeding."
language.languageclueboatwhat = "A fully scripted website that mimics a compromised webpage!"
language.languageclueboathowtouse = ""
language.languageclueboatwhyuseit = "It's a challenge. Visit the website, count to 15 seconds, and mimic a real incident ... *CLOSE THE WEBSITE*.
Using your existing security tools try and find everything that happened.
Compare this to what you can find with Symantec's Security Analytics (pviosuly BlueCoat, previosuly Solera)"
language.languageclueboatdetails = "So here is the challenge. Can you work backwords and find...