Vault7: CIA Hacking Tools Revealed
Navigation: » Latest version
Owner: User #1179751
Watch For PSP Popups
This guide is an example oh how to use the PSPPersonal Security Product (Anti-Virus) testing tools found in the AEDApplied Engineering Devision leafbag. The purpose of these classes are to give developers and testers a better idea as to what level of alert is made available to the user.
Step-by-step guide
We'll be filling this in later as we figure it out. This is a work in progress User #4194308 User #4194308
- Insert your steps.
- You can also copy and paste or drag and drop images into your instructions.
#This should seem familiar because it is required for all leafs
import tybase.undermine.leaf as leaf
import tybase.undermine.meta.leafi as leafi
#This is a hack to allow us to enumerate the host object
import tybase.palantir.client
import tybase.undermine.client
#Back to the familiar
class Kaspersky(leaf.Leaf):
def __init__(self, host):
assert isinstance(host, tybase.palantir.client.Client)
assert isinstance(host, tybase.undermine.client.Client)
self.host = host
self.outfolder = "C:\\tmp\\"
self.outfile = self.outfolder + "kasp.txt"
if not self.host.path_exists(self.outfolder):
self.host.execcmd("mkdir " + self.outfolder, shell=True)
#hard code the locations the av product could reside.
self.path = "C:\\Program Files\\Kaspersky Lab\\Kaspersky Internet Security 14.0.0\\avp.com"
def scan(self, path=[]):
#Build a command line scan of all files to scan which are include in the path array
return
def parselog(self, path_to_log):
#look through the logs here, return true if everything is ok. False otherwise.
return
def readlog(self, path_to_log):
#simply read logs into memory, so we can get a before and after
return
def uploadlog(self, path_to_log):
#upload the logs to dart
return
Related articles
('contentbylabel' missing)