Home / Comodo Parent Injection Leak Test Suite
Comodo Parent Injection Leak Test Suite
The CPIL suite contains three separate tests especially developed to test a firewall's protection against parent injection leak attacks.
Each of the three tests involves the user typing some random text into a text box which CPIL will attempt to transmit to the Comodo website. If your firewall doesn't prevent it from doing this, it fails the test.
Download Comodo Parent Injection Leak Test Suite
Clicking the link above will download a small .zip called 'CPILSuite.zip'. After downloading, double click the .zip file and extract the contents to your desktop. This will create a new folder called 'CPILSuite'. Double click to open the folder then double click the file 'CPILSuite.exe' to start the interface:
You should type some random text into the space marked 'Data to be sent:'
Next, you should click the 'Test 1' button to see if your firewall detects the leak test and prevents CPIL from transmitting your data. Repeat this process for Test 2 and Test 3.
Clicking the 'Tell me more..' links displays a detailed description of the specific leak test.
The CPIL Suite is a harmless simulation of an attack technique and poses no threat to the security of your computer - it merely informs you whether or not your firewall is providing adequate protection.
No other firewall has passed all three of these tests with default settings, does yours?
If your firewall passes the test, it should warn you that CPILSuite.exe is trying to access the internet. The alert shown on the left is just one of the warnings that Comodo Firewall Pro displays to the user.
If you firewall fails the test, you will be taken to a Comodo webpage that will display the text you entered.
You should download and install Comodo Firewall Pro and run the test again.
Everyday, Internet users are exposed to viruses, trojans and spyware without their knowledge. Personal firewalls form the first line of the defense to answer to these threats. Network filtering and outbound application connection filtering are the two essential components that a robust and secure personal firewall must have, that most of the personal firewalls currently in the market claim to provide in some form.
Unfortunately, malware programs are evolving rapidly. Many of such programs employ very advanced techniques to conceal their malicious activities so that they easily bypass the standard protection mechanism provided by the most personal firewalls. These techniques are commonly known as "leak" techniques.