I'm visiting an unknown and possibly malicious website. Lots of them. Python's requests do not run javascript. Can I get infected? Should I consider using a virtual machine?
Can I get a virus by visiting an unknown website using python's requests package?
1.6k Views Asked by userqwerty1 At
1
There are 1 best solutions below
Related Questions in PYTHON
- new thread blocks main thread
- Extracting viewCount & SubscriberCount from YouTube API V3 for a given channel, where channelID does not equal userID
- Display images on Django Template Site
- Difference between list() and dict() with generators
- How can I serialize a numpy array while preserving matrix dimensions?
- Protractor did not run properly when using browser.wait, msg: "Wait timed out after XXXms"
- Why is my program adding int as string (4+7 = 47)?
- store numpy array in mysql
- how to omit the less frequent words from a dictionary in python?
- Update a text file with ( new words+ \n ) after the words is appended into a list
- python how to write list of lists to file
- Removing URL features from tokens in NLTK
- Optimizing for Social Leaderboards
- Python : Get size of string in bytes
- What is the code of the sorted function?
Related Questions in SECURITY
- Can MVC.NET prevent SQL-injection at razor or controller level?
- Forgotten password reset page: should the user need to enter a username/email as well?
- Dynamic roles list in CustomAuthorize ASP MVC
- Access roles from multiple applications
- How to Fix TLS CBC Incorrect Padding Abuse Vulnerability on Windows 2003 Server
- Evernote Web Clipper and Content Security Policy
- Invalidate user credentials when password changes
- Spring Boot MVC non-role based security
- Correct Captcha behaviour on error
- Is macro more secure than static const if I don't want someone to know or change the hardcode value?
- In Android, ensuring only pre-decided users can only use the app
- Authenticating plain text passwords against md5 hash in DB using Apache Shiro
- Symfony2 - handle HTTP/Entity user access restrictions
- Client side computation without exposing code?
- searchable row level encryption using java?
Related Questions in PYTHON-REQUESTS
- Invalid URL: No host supplied : error while using Request.get(url) in Python
- compare python requests with curl
- Python Requests just got very slow, better alternative?
- I want to create file in azure share using python PUT requests but getting error signature not correct including headers
- python requests SSLError
- Python-Requests Chunked XML Data Returns only First 2 Lines of Data
- Reusing connections in Django with Python Requests
- Log in to website behind CloudFlare using Python Requests
- Python requests throwing SSLError while using local certificate
- Python web request slow through Proxy
- Google redirects query request 503 error
- Python child process silently crashes when issuing an HTTP request
- Alternative to using mechanize to fetch data?
- http 500 error when attempting to make a post request with python requests module
- Getting cookies with requests
Related Questions in VIRUS
- aggressive adware irremovable apk on android
- Virus, trojan while Securing .Net assembly with obfuscators
- Can a virus be executed by reading a file using System.IO libraries?
- Can I get a virus by visiting an unknown website using python's requests package?
- Virus causing wrong date to display
- Avira finds adware "ANDR.LLond.AJ" while deploying app in Android Studio
- How do I find what file or request which executed particular command? DAMP
- Are there any open source viruses?
- Simple Virus Remover
- VB.net MD5 checksums to Hex
- Export .dat to Xml or readable file with help of .fmt
- VB.net quarantine techniques
- Are there methods that would help to make software immune to viruses?
- What to do when the application I wrote (its setup file) is flagged as virus/trojan?
- Unknown code in webpages
Trending Questions
- UIImageView Frame Doesn't Reflect Constraints
- Is it possible to use adb commands to click on a view by finding its ID?
- How to create a new web character symbol recognizable by html/javascript?
- Why isn't my CSS3 animation smooth in Google Chrome (but very smooth on other browsers)?
- Heap Gives Page Fault
- Connect ffmpeg to Visual Studio 2008
- Both Object- and ValueAnimator jumps when Duration is set above API LvL 24
- How to avoid default initialization of objects in std::vector?
- second argument of the command line arguments in a format other than char** argv or char* argv[]
- How to improve efficiency of algorithm which generates next lexicographic permutation?
- Navigating to the another actvity app getting crash in android
- How to read the particular message format in android and store in sqlite database?
- Resetting inventory status after order is cancelled
- Efficiently compute powers of X in SSE/AVX
- Insert into an external database using ajax and php : POST 500 (Internal Server Error)
Popular Questions
- How do I undo the most recent local commits in Git?
- How can I remove a specific item from an array in JavaScript?
- How do I delete a Git branch locally and remotely?
- Find all files containing a specific text (string) on Linux?
- How do I revert a Git repository to a previous commit?
- How do I create an HTML button that acts like a link?
- How do I check out a remote Git branch?
- How do I force "git pull" to overwrite local files?
- How do I list all files of a directory?
- How to check whether a string contains a substring in JavaScript?
- How do I redirect to another webpage?
- How can I iterate over rows in a Pandas DataFrame?
- How do I convert a String to an int in Java?
- Does Python have a string 'contains' substring method?
- How do I check if a string contains a specific word?
No, merely downloading HTTP data won't install a virus.
A virus needs to be activated too, and
requestsdoesn't do anything with the downloaded data for that to happen. Normally, a virus uses bugs in the browser (or more commonly, a plugin in the browser) to trigger code execution, or by tricking the user into executing the downloaded file. For example, bugs in the Flash player executing a Flash file could be used to run arbitrary code, or the user is tricked into believing they downloaded a document but it is really an executable program.