- Dec 23, 2014
- 8,852
Hi Andy,
167 items in FirewallHardening
I forgot to turn on Logging for Firewall Control, I only tried to log Defender firewall, and the log was gone.
OK. Turn it ON. We will see if something is blocked.
Hi Andy,
167 items in FirewallHardening
I forgot to turn on Logging for Firewall Control, I only tried to log Defender firewall, and the log was gone.
Do you want me to turn the frewallhardning logging on and then put the test machine online?OK. Turn it ON. We will see if something is blocked.
Do you want me to turn the frewallhardning logging on and then put the test machine online?
They don't typically attempt to hack into your computer, send malicious emails, or try to get malware onto a victim's system. Direct attacks on Guest network connected devices are not very productive. Therefore, not the attack of choice. A direct attack is on the tinfoil hat fringe section of the attack bell curve.I know that there are sometimes hackers at cafes.
Andy has these nailed. The attack highly likely involved some of those. And the test machine was ill prepared. But then, these all have to do with the landing. The machine idealy should be able to defend itself after the landing took place. However, the setup was not prepared for the Evasion stage of the attack ( see Mitre Att&ck) where the attacker would be able to assess and find out what defenses are onboard and then work his way around them or deactivate them one after the other.network device exploits, abusing opened ports, DNS poisoning, MITM attacks, firewall exploits, abusing vulnerable protocols or system processes, etc
Summary. I will try to answer all the previous unanswered questions.
All the setup and configuration was done with the computer offline, in the order of presentation in the OP. I made sure that the MS Baseline IS a baseline by applying it first, followed by the Cloud Protectiion modification.
OSArmor has lots of restrictions applied, but they are mostly GUI based. This stops GUI based RATs hopefully. After realizing that the setup missed hardening, I re-did the whole configuration, added SysHardener as the second step, following the MS Baseline & Cloud Protection setup.'' SysHardener has all settings checkmarked except the uninstallation items. ( I think it can not re-install them )
Then I followed Andy's screenshots and also setup ConfigureDefender and FirewallHardening as directed.
Then I setup OSArmor and turned on all protections.
Then I setup Sysmon using this xml. It should delete any newly created executables.
The user needs an implementation procedure documented otherwise they cannot determine what is conflicting with what by using a reverse procedure to make the determination.Yes, the setup must be done in a specific order to avoid conflicts and misconfiguration.
Syshardener can be skipped because it is mainly covered by other tools.
- MS Baseline + some policies must be reset to Not Configured to avoid conflict with WHHLight
- WHHLight + tools
- OSARmor
- Sysmon
Some more work must be done to avoid conflicts. For example:
- In some cases, OSARmor blocks viewing the Logs from WHHLight tools (notepad blocked due to high privileges),
- Sysmon can block WHHLight tools,
- Sysmon will block OSARmor and WHHLight updates.
I understand all that already.
- In some cases, OSARmor blocks viewing the Logs from WHHLight tools (notepad blocked due to high privileges),
- Sysmon can block WHHLight tools,
- Sysmon will block OSARmor and WHHLight updates.