App Review Bypass Firewall kaspersky 2017

It is advised to take all reviews with a grain of salt. In extreme cases some reviews use dramatization for entertainment purposes.
According to YouTube the video is set to private so I cannot view it.

https://snag.gy/NdTAHD.jpg

NdTAHD.jpg

If you don't mind me asking, what is the purpose/scope of the vulnerability (as in what does the bypass actually result in, e.g. execute malware and perform actions without triggering the protection, bypass self-protection to terminate Kaspersky Firewall from memory, privilege escalation, etc)?
 
as far as I know, if the program is already executed before being blocked by kaspersky firewall or application control it is not applied yet. The rule is applied after you turn the app off and open it again

I tried to block iobit advanced system care service using app control when it was running in background but the service was still running without being killed. Then manually killed the service and then I wouldnt be able to execute anymore
 
as far as I know, if the program is already executed before being blocked by kaspersky firewall or application control it is not applied yet. The rule is applied after you turn the app off and open it again

I tried to block iobit advanced system care service using app control when it was running in background but the service was still running without being killed. Then manually killed the service and then I wouldnt be able to execute anymore
Yes, it would be interesting to see the same bypass without the prog already in memory :D
and without "resume" used.

I made a test with ZAM already running.

- I run a Deep scan
- I selected deny during the scan
=> cloud blocked : "No internet connection" (no need to quit and run again)
So the bypass seems to be working, by using the Freegate + proxy and the IDE on "pause"
(no other stuff)

A lot of steps have to be done manually, curious to see if a malware can do that without KIS blocking o_O
 
Last edited:
Yes 4 years ago

kis 2013/14 /15/16/17 ==>>bypass

Kaspersky Endpoint Security== pass

Ask @harlan4096 for assistance in submitting the bug; he is very long-time Kaspersky beta tester\forum member and - I would assume after all these years - has forged contacts with Kaspersky staff.

I have found that a lot of time bugs get reported, but for whatever reason(s) they don't get put onto the "To Do" list because the report is never brought the attention of the person(s) managing the "To Do" list...
 
Am I the only one to think that there's absolutely no problem? The connection are made by psiphon which is trusted... so, is there really a problem?
It was only on the last update video, the use of psiphon (I just watched it), after @harlan4096 asked for "Monitor all network ports"
 
Last edited: