[OWASP-Bangalore] Reverse Honey Trap - Striking Deep inside Online Web Antivirus Engines and Analyzers

Rohit Bansal rohitisback at gmail.com
Mon Oct 4 11:25:11 EDT 2010


*Reverse Honey Trap - Striking Deep inside Online Web Antivirus Engines and
Analyzers*


Web based online anti viruses are used heavily for scanning malware files
and providing the resultant output. There are number of online service
providers which perform inline scanning of uploaded malware executables by
the normal user or the victims. This process is based on the hierarchical
functions and different steps opted to analyze the viruses and other worm
activities. The infections occur dynamically when the executable becomes
active in the environment. Everything is automated in this process as
servers residing at the backend scan the executable and sent the information
to other third party servers for secondary analysis or updating their record
directly. That’s how the normal functioning of free online malware scanner
works.


https://infosecisland.com/blogview/4214-Reverse-Honey-Traps-Beating-Online-Anti-virus-Engine-in-its-Own-Game.html


Thanks & Regards
Rohit Bansal
http://in.linkedin.com/in/rb1337
-------------- next part --------------
An HTML attachment was scrubbed...
URL: https://lists.owasp.org/pipermail/owasp-bangalore/attachments/20101004/713547db/attachment.html 


More information about the OWASP-Bangalore mailing list