[clamav-users] Verifying bytecode, phishing and other type of threats
Indranil
myselfindranil at gmail.com
Thu Sep 30 12:42:35 UTC 2021
Hello ClamAV folks,
I have downloaded ClamAV and verified
the eicar test using clamscan on a Windows VM. It appears that the
following detection capabilities are also enabled by default:
bytecode, scan-mail, phishing-sigs, phishing-scan-urls, scan-pe,
scan-elf, scan-pdf, scan-html. Out of these options, I am able to test
scan-pe, scan-elf, scan-pdf and scan-html using respective files. I
have not been able to test the rest of the options such as bytecode,
scan-mail, phishing-sigs and phishing-scan-urls. Could you please help
with the method of verifying individual options. Also, when a threat
is detected, does ClamAV report the type of the threat i.e. does
ClamAV report that Threat1 is a ‘bytecode’ threat, Threat2 is a
‘phishing-sigs’ threat?
If I am scanning C:\Users\Indranil via
clamscan (with recursive option) then does
‘C:\Users\Indranil\AppData\Local\Microsoft\Outlook’ get tested for
virus only if ‘scan-mail’ option is on?
Thank you,
Indranil
More information about the clamav-users
mailing list