Such actions trying to deceive the firewall leak tests, hoping that one would think that with connect a legal application, and, consequently, to allow such action. One of the first well-known leak tests was a product of Steve Gibson of grc under the simple name? Leak Test '. This program simulate attacks, in which the pernicious application renames itself into Internet Explorer, try to enter the network and identify, notice whether the firewall is installed such substitution. Since then much has changed, and today likstesty much stronger and harder than their progenitors, they use much more sophisticated techniques of inspection programs. These techniques, unfortunately, are also used by the authors of malicious programs, such as keystroke loggers, to capture the target user's data. Leak tests verify the ability of preventive protection, testing, as a security solution react to a specific technique of invasion, sometimes called "Vector of attack." This is different from the tests at catching viruses, where the test is the ability of anti-virus solutions to identify a specific signature code.
Techniques included in the arsenal liktestovLiktesty too diverse to give them a common classification according to their actions, they use different techniques to test the ability of protective programs. Their actions are constantly growing and improving, and as Typically, the more leak tests exist, the better – more complete security solution to be tested. In summary, it should be noted that the leak tests based on one or more methods of testing, the following: – attempts to counterfeit the name of a trusted application, located on the computer.