I was testing out the Java Applet attack on the SET pentest program, but when I click run on the java applet that opens up when accessing the page, my AV (AVAST free version), blocked the executable.
Has anyone had this issue? is there a way to bypass the AV?
FYI: i'm running BT4R2 on a virtual environment. the machine being "attacked" is a windows 7 home premium running Avast free version 5.0.677.
The attack options on the Java Applet attack were Windows Reverse_TCP Meterpreter with Backdoor executable.
thanks for your response.
I'm not really sure, what is the file you sent for analysis, but i was able to recover the file that was blocked by my AV and this is what i found:
Multi-Engine Antivirus Scanner - Services - NoVirusThanks.org
It is saying that Avast did not recognized this file as a threat. Maybe I have updates that the site does not.
Anyways, is there any settings, any other option inside SET that i can bypass the AVs that are blocking my test?
Was this file you sent for analysis creates by SET? what options did you choose?
Last edited by Archangel-Amael; 12-03-2010 at 11:00 PM.
anyone has any idea?