![]() ![]() So this type of download is bypassing the web shield completely and could be a potential entry point for malware using the same delivery method, whilst this isn't serious if you are paying attention firefox asks what action to take. Regardless if that is correct or not, even assuming it wasn't an exe file, it wasn't scanned by the web shield 'at all.' ![]() What I'm confused with, when the file arrives on my HDD it is saved as mirror.exe (the file I uploaded), so it must surely come down the pipe associated with that file name, see image. html tagged on at the end file_ and the *.exe.* would assuming it worked trap that as well. Now check your apache log file from \var\log\apache2\log you can check if avst.html page has been visited or ntavst.html page.I don't know, but I wouldn't use that way as the exe.* would be likely to block some security sites that display virus information of files associated with a virus as some use the file_name.exe as the page name with. So if avast installed then it redirect to avast.html page
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
December 2022
Categories |