Comodo Firewall : Parent Injection Leak Test Suite
Will my security software prevent my confidential data from being transmitted to a hacker?
Will my security software stop a virus from corrupting or destroying my important documents?
TEST YOUR SECURITY SOFTWARE & find an answer to these questions right here. Learn more.
Firewall Test Description
The CPIL suite contains three separate tests especially developed by Comodo engineers to test a firewall's protection against parent injection leak attacks. Each of the three tests involves the user typing some random text into a text box which CPIL will attempt to transmit to the Comodo servers.
Test 1: Attempts to disable firewall hooks by directly accessing the physical memory and then modifies explorer.exe to bypass the firewall by running iexplore.exe with a command line address.
Test 2: Attempts to inject cpil2.dll into explorer.exe by using Windows accessibility API and then tries to bypass the firewall by running iexplore.exe with a command line address.
Test 3: Attempts to inject cpil3.dll into explorer.exe by using Windows accessibility API and then tries to bypass the firewall by running iexplore.exe and modifying iexplore.exe with DDE communication.
You should type some random text into the field marked 'Data to be sent'. Next, you should click the 'Test 1' button to see if your security software prevents CPIL from transmitting your data. Repeat the same process for Test 2 and Test 3.
If your firewall passes the test, it should warn you that CPILSuite.exe is trying to access the internet. If it fails you will be taken to a Comodo webpage that will display the text you entered.
|Type of Test||Firewall and HIPS|
|Techniques used||Process Injection|
|Operating System(s)||Windows 2000/ Windows XP/ Windows Vista|
|Number of Tests||3|