Jump to content
Microsoft Windows Bulletin Board

eicartest


Recommended Posts

Guest eicartes
Posted

http://www,eicartest.com

 

If you are active in the anti-virus research field, then you will regularly receive requests for virus samples. Some requests are easy to

deal with: they come from fellow-researchers whom you know well, and whom you trust. Using strong encryption, you can send them what they

have asked for by almost any medium (including across the Internet) without any real risk.

 

Other requests come from people you have never heard from before. There are relatively few laws (though some countries do have them)

preventing the secure exchange of test viruses between consenting individuals, though it is clearly irresponsible for you simply to make

viruses available to anyone who asks. Your best response to a request from an unknown person is simply to decline politely.

 

A third set of requests come from exactly the people you might think would be least likely to want viruses "users of anti-virus software".

 

 

They want some way of checking that they have deployed their software correctly, or of deliberately generating a "virus incident in order to

test their corporate procedures, or of showing others in the organisation what they would see if they were hit by a virus".

 

Obviously, there is considerable intellectual justification for testing anti-virus software against real viruses. If you are an anti-virus

vendor, then you do this (or should do it!) before every release of your product, in order to ensure that it really works. However, you do

not (or should not!) perform your tests in a "real" environment. You use (or should use!) a secure, controlled and independent laboratory

environment within which your virus collection is maintained.

 

Using real viruses for testing in the real world is rather like setting fire to the dustbin in your office to see whether the smoke detector

is working. Such a test will give meaningful results, but with unappealing, unacceptable risks.

 

Since it is unacceptable for you to send out real viruses for test or demonstration purposes, you need a file that can safely be passed

around and which is obviously non-viral, but which your anti-virus software will react to as if it were a virus.

 

If your test file is a program, then it should also produce sensible results if it is executed. Also, because you probably want to avoid

shipping a pseudo-viral file along with your anti-virus product, your test file should be short and simple, so that your customers can easily

create copies of it for themselves.

 

The good news is that such a test file already exists. A number of anti-virus researchers have already worked together to produce a file that

their (and many other) products "detect" as if it were a virus.

 

Agreeing on one file for such purposes simplifies matters for users: in the past, most vendors had their own pseudo-viral test files which

their product would react to, but which other products would ignore.

 

This test file has been provided to EICAR for distribution as the "EICAR Standard Anti-Virus Test File", and it satisfies all the criteria

listed above. It is safe to pass around, because it is not a virus, and does not include any fragments of viral code. Most products react to

it as if it were a virus (though they typically report it with an obvious name, such as "EICAR-AV-Test").

 

The file is a legitimate DOS program, and produces sensible results when run (it prints the message "EICAR-STANDARD-ANTIVIRUS-TEST-FILE!").

 

It is also short and simple - in fact, it consists entirely of printable ASCII characters, so that it can easily be created with a regular

text editor. Any anti-virus product that supports the EICAR test file should detect it in any file providing that the file starts with the

following 68 characters, and is exactly 68 bytes long:

 

X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*

 

The first 68 characters is the known string. It may be optionally appended by any combination of whitespace characters with the total file

length not exceeding 128 characters. The only whitespace characters allowed are the space character, tab, LF, CR, CTRL-Z. To keep things

simple the file uses only upper case letters, digits and punctuation marks, and does not include spaces. The only thing to watch out for when

typing in the test file is that the third character is the capital letter "O", not the digit zero.

 

You are encouraged to make use of the EICAR test file. If you are aware of people who are looking for real viruses "for test purposes", bring

the test file to their attention. If you are aware of people who are discussing the possibility of an industry-standard test file, tell them

about http://www.eicartest.com, and point them at this article.

 

In order to facilitate various scenarios, we provide 4 files for download. The first, eicar.com, contains the ASCII string as described

above. The second file, eicar.com.txt, is a copy of this file with a different filename. Some readers reported problems when downloading the

first file, which can be circumvented when using the second version. Just download and rename the file to "eicar.com". That will do the

trick. The third version contains the test file inside a zip ARCHIVEe. A good anti-virus scanner will spot a 'virus' inside an ARCHIVEe. The

last version is a zip ARCHIVE containing the third file. This file can be used to see whether the virus scanner checks ARCHIVEes more than

only one level deep Virus detection.

 

Once downloaded run your AV scanner. It should detect at least the file "eicar.com". Good scanners will detect the 'virus' in the single zip

ARCHIVEe and may be even in the double zip ARCHIVEe. Once detected the scanner might not allow you any access to the file(s) anymore. You

might not even be allowed by the scanner to delete these files. This is caused by the scanner which puts the file into quarantaine. The test

file will be treated just like any other real virus infected file. Read the user's manual of your AV scanner what to do or contact the

vendor/manufacturer of your AV scanner.

 

Important note: EICAR cannot be held responsible when these files or your AV scanner in combination with these files cause any damage to your

computer. YOU DOWNLOAD THESE FILES AT YOUR OWN RISK. Download these files only if you are sufficiently secure in the usage of your AV

scanner. EICAR cannot and will not provide any help to remove these files from your computer. Please contact the manufacturer/vendor of your

AV scanner to seek such help.

 

 

 

--

--------------------------------- --- -- -

Posted with NewsLeecher v3.9 Beta 6

Web @ http://www.newsleecher.com/?usenet

------------------- ----- ---- -- -

Guest David H. Lipman
Posted

From: "eicartes" <contact@eicartest.com>

 

| http://www,<snip>.com

|

| If you are active in the anti-virus research field, then you will regularly receive

| requests for virus samples. Some requests are easy to deal with: they come from

| fellow-researchers whom you know well, and whom you trust. Using strong encryption, you

| can send them what they have asked for by almost any medium (including across the

| Internet) without any real risk.

|

< snip >

 

Useless post...

Useless website !

 

Go directly to the source -- http://www.eicar.org

 

--

Dave

http://www.claymania.com/removal-trojan-adware.html

http://www.ik-cs.com/got-a-virus.htm

Guest Phil Weldon
Posted

'David H. Lipman' wrote:

| Useless post...

| Useless website !

|

| Go directly to the source -- http://www.eicar.org

_____

 

And broken link.

At least you can mulch junk snail mail B^)

 

Phil Weldon

 

"David H. Lipman" <DLipman~nospam~@Verizon.Net> wrote in message

news:eqKYbV8zHHA.1168@TK2MSFTNGP02.phx.gbl...

| From: "eicartes" <contact@eicartest.com>

|

|| http://www,<snip>.com

||

|| If you are active in the anti-virus research field, then you will

regularly receive

|| requests for virus samples. Some requests are easy to deal with: they

come from

|| fellow-researchers whom you know well, and whom you trust. Using strong

encryption, you

|| can send them what they have asked for by almost any medium (including

across the

|| Internet) without any real risk.

||

| < snip >

|

| Useless post...

| Useless website !

|

| Go directly to the source -- http://www.eicar.org

|

| --

| Dave

| http://www.claymania.com/removal-trojan-adware.html

| http://www.ik-cs.com/got-a-virus.htm

|

|

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...