lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <Law11-OE32UlUjLdxeT00029726@hotmail.com>
From: se_cur_ity at hotmail.com (morning_wood)
Subject: Bogus Viral Test - NO HARMFULL CONTENT

======================================
This is an exploitlabs.com false positive email agent test
======================================
BEGIN
--------------
Win32.Palyh.A (New!)
Win32.Fizzer (New!)
Win32/SQLSlammer.Worm
Win32.Sobig
Win32.Lirva.A
Win32.Yaha.K
Win32.Bugbear  (Also known as Win32/Bugbear.Worm, WORM_NATOSTA.A,
Worm/Tanatos, Win32.Bugbear.A@mm, Win32/Bugbear.A, )
Win32.Klez.H  (Also known as Win32/Klez.H.Worm, WORM_KLEZ.G and
Win32.Klez.H@mm)
JDBGMGR.EXE Hoax
Win32.Nimda.A   (Also known as W32/Nimda@MM)
Win32.Nimda.E  (also known as Win32.Nimda.C Worm)
Win32.Magistr.29188   (Also known as W32/Magistr.B, Win32.Magistr.B@mm and
I-Worm Magistr.b)
Win32.Sircam.137216
Win32.Hybris
Win32.Auric.A (Also known as Win32/Auric.A.Worm)
Win32.Holar.F (Also known as Win32/Holar.F.Worm, W32/Holar.h@MM (McAFee))
Win32.Naco.B (Also known as W32/Meldrood.B@mm (F-Secure), Win32/Naco.Worm,
I-Worm.Nocana.b (Kaspersky))
Win32.Fibot.022 (Also known as Backdoor.IRC.Bot (Symantec),
Win32/IRCBot.26624.Trojan)
Win32.Lovgate.L (Also known as W32.HLLW.Lovgate.I@mm (Symantec),
W32/Lovgate.I@M (McAFee), Win32/LovGate.L.Worm)
Win32.Melare.Worm (Also known as W32.Ahlem.A@mm (Symantec), I-Worm.Melare
(Kaspersky), Win32/Melare.Worm, W32/Melare@MM (McAfee))
Win32.Thaprog (Also known as W32/Gant.b@MM (McAfee), W32.HLLW.Redist@mm
(Symantec), Win32/Thaprog.Worm)
Win32.Cult.H (Also known as Win32/Cult.C1.Worm, W32/Cult.worm.gen (McAfee),
W32.HLLW.Cult.C@mm (Symantec))
Win32.Sobig.B (Also known as W32.HLLW.Mankx@mm (Symantec), I-Worm.Palyh
(Kaspersky) , Win32.Palyh.A, WORM_PALYH.A (Trend), Win32/Palyh.A.Worm ,
W32/Palyh@MM (McAfee), I-Worm.Sobig.b (Kaspersky), Win32/Sobig.B.Worm,
W32/Sobig.b@MM (McAfee), W32.SoBig.B@mm (Symantec))
Win32.Lovgate.I (Also known as W32.HLLW.Lovgate.H@mm (Symantec),
I-Worm.LovGate.F (Kaspersky))
----------
END




This was a text only message  with NAMES only.

This test is a idea and concept by Donnie Werner of exploitlabs.com to test
the false positive reporting of current email AV agents. This test, and its
proceedures are the exclusive property of Donnie Werner and exploitlabs.com
and may not be used without express writen consent. Failure to obtain
permission from exploitlabs.com to recreate such a test will be prossecuted
to the full extent of the law as provided by the governing country of  the
originating attempted test, the users ISP and DNS providers.

Donnie Werner
exploitlabs.com


"Chew on that Nick -n- ms Jimi"

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ