Will my security software prevent my confidential data from being transmitted to a hacker?
Will my security software stop a virus from corrupting or destroying my important documents?
TEST YOUR SECURITY SOFTWARE & find an answer to these questions right here. Learn more.
Thermite attempts to find a running instance of Internet Explorer, inject tiny infection code and create a remote thread in it. From the Internet Explorer process it then tries to establish socket connections and transfer information to the Internet server.
|Type of Test||HIPS and Firewall|
|Techniques used||Process Injection|
|Operating System(s)||Windows 2000/ Windows XP|
|Number of Tests||1|