This section explains how to verify that Kaspersky Scan Engine works correctly in HTTP mode.
Verifying that Kaspersky Scan Engine detects malicious files correctly
To verify that Kaspersky Scan Engine detects malicious file correctly:
The following example shows how to do this with the sample HTTP client:
./kavhttp_client -f eicar.txt |
Verifying that Kaspersky Scan Engine detects malicious files in system memory correctly
To verify that Kaspersky Scan Engine detects malicious files in system memory correctly:
The following example shows how to do this with the sample HTTP client:
./kavhttp_client eicar.txt |
Verifying that Kaspersky Scan Engine detects malicious and phishing URLs correctly
To verify that Kaspersky Scan Engine detects malicious and phishing URLs correctly:
http://bug.qainfo.ru/TesT/Wmuf_w
by using your HTTP client.This URL is not malicious. Kaspersky is using this URL to test the detection capabilities of anti-virus software.
The following example shows how to do this with the sample HTTP client:
./kavhttp_client -u |
http://bug.qainfo.ru/TesT/Aphish_w
by using your HTTP client.This URL is not phishing. Kaspersky is using this URL to test the detection capabilities of anti-virus software.
The following example shows how to do this with the sample HTTP client:
./kavhttp_client -u |
Verifying that File and URL Reputation Checking works correctly
To verify that File and URL Reputation Checking works correctly:
KAV_SHT_ENGINE_KSN
flag is not specified in the Flags
element of the HTTP mode configuration file.Flags
element of the HTTP mode configuration file.