I currently do my first (baby)steps with UTM 9.
I have setup the community edition on VMWARE, configured only the Web Protection and point Firefox 25, which runs in a Sandboxie process to the UTM9 http proxy.
This works fine so far.
I'd like to test the way UTM9 handles malware sites. I found WICAR.org | Malicious Website for Testing Internet Filters, Anti-malware, Proxies etc. providing some weblinks with supposedly disabled or changed payload
(--> "The exploits contain a non-malicious payload which under Windows will execute 'calc.exe', the in-built calculator (if your browser is vulnerable). "
I also found a list of actual NOT-SO-HARMLESS malware sites at MDL.
My question is if I run Firefox in a Sandbox and point to the UTM9 web proxy where I configured the Web Protection to block all Malware, is this a test scenario that would work? (and keep my PC as protected as possible)?
I did access the wicar.org examples from an old PC and UTM9 blocks a few, but not all. Some examples just never stop loading. I somewhat hesitate to test with the known malware list on the other website..
Or is there a better way to test and gain some experience? Any testbed that is known to you all, or how hints on you are testing?
Thanks
Dan
This thread was automatically locked due to age.