language.pagemalwaremenutitle = "Malware" language.pagemalwaremenumalwareeicarc = "Malware EICAR C" language.pagemalwaremenumalwareeicarcsharp = "Malware Eicar C#" language.pagemalwaremenumalwareeicarcsandbox = "Malware Sandbox" language.pagesslmenutitle = "SSL / TLS" language.pagesslmenuconfigrace = "SSLv Config Race" language.pagesslmenueicar = "SSL With Eicar Test" language.pagesslmenudlp = "SSL With DLP Test" language.pagesslmenudowngrade = "SSL Downgrade Test" language.pagemiscmenutitle = "Misc" language.pagemiscmenuclueboat = "The Clue Boat" language.pagemiscmenuzippedfiles = "Zipped Files" language.pagemiscmenuhttpupload = "HTTP Upload" language.pagemiscmenuheaders = "HTTP Headers" language.languageidentifydesc = "To help us understand your needs, please identify as either:"; language.languageidentifyemployee = "Employee Name" language.languageidentifyorganisation = "Organiistion" language.languagemisctitle = "The 7 blessings toolbox" language.languagemiscaboutbody = "A simple toolbox to demonstarte, test, and validate.
Domain name in tribute to my south african friend blessing, may his inappropriate shoulder stroking haunt others like it haunted me.
Created by andy shepherd" language.languagemiscabout = "About" language.languagemiscwhat = "What?" language.languagemischowtouse = "How to use?" language.languagemiscwhyuseit = "Why use it?" language.languagemiscdownloadnew = "Download New" language.languagemisclastfiles = "Download Previous" language.languagemiscfile = "Files" language.languagemiscmd5hash = "MD5 Hash" language.languagemisccreated = "Created" language.languagemiscsize = "Size" language.languagemiscbytes = "Bytes" language.languagemiscsourcecode = "Sourcecode" language.languagemiscdetails = "Details" language.languagemiscdownload = "Download" language.languagemiscoutput = "Output" language.languagemalwareeicarcheader = "Malware Eicar C" language.languagemalwareeicarcgrnwwarning = "This is written (by john payne) in pure c, it does *not* require dot net !" language.languagemalwareeicarcwhat = "A freshly generated 100% benign compiled exe that mimics behaviour actions of real malware. as the malware is generated frequently, the hash should already not be known to any security tool." language.languagemalwareeicarchowtouse = "Download this file on the target computer and investigate in the security tools.
Hash based tools should not detect it.
Sandbox tools should detonate and detect.
if you have an inline realtime blocking tool, this file should not get delivered." language.languagemalwareeicarcwhyuseit ="* Demonstrate the value of real time detonation vs hash based technologies.
* Test your deployment, 1 click proves that the integrations are talking together
* Use over https to test decryption configurations" language.languagemalwareeicarcdownloadnew = "Click here to generate a new safe 'malware' file, and download." language.languagemalwareeicarcsharpheader = "Malware Eicar C#" language.languagemalwareeicarcsharredwwarning = "Warning : Due to the compiler (MONO/MCS), these files require a 'Microsoft DotNet 4.5' environment to execute." language.languagemalwareeicarcsharpwhat = "A freshly generated 100% benign compiled exe that mimics behaviour actions of real malware. As the malware is generated frequently, the hash should already not be known to any security tool." language.languagemalwareeicarcsharphowtouse = "Download this file on the target computer and investigate in the security tools.
Hash based tools should not detect it.
Sandbox tools should detonate and detect.
If you have an inline realtime blocking tool, this file should not get delivered." language.languagemalwareeicarcsharpwhyuseit = "* Demonstrate the value of real time detonation vs hash based technologies.
* Test your deployment, 1 click proves that the integrations are talking together
* Use over HTTPs to test decryption configurations" language.languagemalwareeicarcsharpdownloadnew = "Click here to generate a new safe 'malware' file, and download." language.languagepafishheader = "Malware Sandbox (Pafish)" language.languagepafishpreface = "Many thanks to https://github.com/a0rtega/pafish for your work!" language.languagepafishwhat = "Generated 100% benign compiled exe that mimics behaviour actions of real malware.
As the malware is generated frequently, the hash should already not be known to any security tool.
This tool differs from the above as it detonates in a Sandbox, and not the full iVM making it ideal for testing and showing MASS." language.languagepafishhowtouse = "Download this file on the target computer and investigate in the security tools.
Hash based tools should not detect it.
Sandbox tools should detonate and detect.
If you have an inline realtime blocking tool, this file should not get delivered." language.languagepafishwhyuseit = "* Demonstrate the value of real time detonation vs hash based technologies.
* Demonstrate security delivere to devices using Cloud proxy
* Use over HTTPs to test decryption configurations" language.languagempafishdownloadnew = "Click here to generate a new safe 'malware' file, and download." language.languagesslconfigraceheader = "SSLV Configuration Race" language.languagesslconfigraceredwwarning = "" language.languagesslconfigracewhat = "A short video to show how quick the SSLv can be configured." language.languagesslconfigracehowtouse = "Simply play the video to the client." language.languagesslconfigracewhyuseit = "Many technologies are described as 'quick to configure', this is proof.
This is ideal when demonstrating the ease of use of SSLv compared to it's main competitors." language.languagesslconfigracedownloadnew = "" language.languageclueboatheader = "The Clue Boat Challenge" language.languageclueboatredwarning = "Read the warning entry page before proceeding." language.languageclueboatwhat = "A fully scripted website that mimics a compromised webpage!" language.languageclueboathowtouse = "" language.languageclueboatwhyuseit = "It's a challenge. Visit the website, count to 15 seconds, and mimic a real incident ... *CLOSE THE WEBSITE*.
Using your existing security tools try and find everything that happened.
Compare this to what you can find with Symantec's Security Analytics (pviosuly BlueCoat, previosuly Solera)" language.languageclueboatdetails = "So here is the challenge. Can you work backwords and find..." language.languagezippedfilesheader = "Zipped Files" language.languagezippedfilesredwwarning = "" language.languagezippedfileswhat = "Collection of files zipped. These contain EICAR, and a random text file to keep random hashes." language.languagezippedfileshowtouse = "Download these files and review what your perimiter and endpoint security allow." language.languagezippedfileswhyuseit = "Test if your security tools are able and configured to look in side ZIP
Test how your security tools handle password protected ZIP files
By using the links top left of the screen, you can combine this test over HTTP, HTTPs, selfsigned HTTPs websites, and Expired SSL websites" language.languagemzippedfilesdownloadnew = "" language.languagehttpuploadheader = "HTTP POST Upload" language.languagehttpuploadredwwarning = "" language.languagehttpuploadwhat = "Allows a user to POST upload a file, the file is not saved to server, no actions are carried out." language.languagehttpuploadhowtouse = "Choose a file and upload." language.languagehttpuploadwhyuseit = "Upload different files to trigger outbound DLP systems.
By using the links top left of the screen, you can combine this test over HTTP, HTTPs, selfsigned HTTPs websites, and Expired SSL websites." language.languagehttpuploaddownloadnew = "" language.languagehttpheadersheader = "HTTP Headers" language.languagehttpheadersredwwarning = "" language.languagehttpheaderswhat = "The Web server is repeating back to you, the HTTP headers that were observed in your request." language.languagehttpheadershowtouse = "Load this page, and read this section." language.languagehttpheaderswhyuseit = "To see which HTTP headers are being added by your Proxy/UTM, and what the remote website can see."