5
509322
Guys don't panic. Look at Panda's bypassed video comment section. They are a Cylance and CB reseller as well. Finally, the actual weakness is in Windows 7 and it's Powershell version 1.0 or 2.0 - all product will fail as they will use all types of powershell attack tools and will always bypass...if not file based, fileless will work as well, after I mentioned about "Invoke Obfuscation" powershell method Carbon Black won't be able to block as well, look at their answers....they still need to combine with Logrhythm or CyberShark to detect. Don't worry guys....trust your own product. Look at this video then you will understand...no security product at this moment can 100% protect you against advanced powershell attack especially fileless based attack. If only their video ran on Windows 10, disable Powershell 2.0, enable Windows Defender, enable your product...if run the exact same attack from the current video of your product...it will fail to bypass..but of course, if they were to reproduce another video running on windows 10, they will surely leverage the attack to another level.
If your product is running on Windows 10 or server 2016, disable Powershell 2.0, running fully on Powershell version 5, setup logging in Events, GPO, setup Logrhythm/Cybershark or other similar tools, install your product ensure support AMSI, Enable Windows Defender and secure it.. then you are protected from the most advanced powershell attack...except invoke Obfuscation Powershell Attack which needs close monitoring on your networks and system event.
LOL... the guy (I think Alessandro) that asked Black Cipher Security to test NVT ERP wanted him to test the most recent stable build of ERP with the default Vulnerable Process List - which includes both cmd.exe and powershell.exe on it - to verify that ERP would protect a home system.
However, Black Cipher Security tested ERP from an Enterprise perspective - and not a home use one. So however he chose the version of ERP - whether deliberately or by chance - he used the old stable version that does not include powershell.exe on the default Vulnerable Process List and he probably removed cmd.exe from the list as well.
If bypassuac is still using Invoke-BypassUAC.ps1 (or whatever the pen-test community is passing around at the moment), then there would have been an alert for powershell.exe in the most recent stable build of ERP. Even in the old stable version of ERP there should be an alert if cmd.exe is launched. As there are no cmd.exe alerts in the video, one of the possible reasons is that he removed cmd.exe from the Vulnerable Process List.
For the guys who wanted or are interested in the ERP test and its results, Black Cipher Security should have shown the Vulnerable Process List - and not just the Settings (which for the most part are irrelevant).
The only thing that people here wanted to know is "Will ERP protect against this type of attack ?" But the video creator performed a test that was not asked for. It's a change-up and sowing confusion. It's simple, home users want a test of actual home use and not Enterprise. The version of ERP and the ERP VPL was probably modified to allow scripts as if ERP were being used in a corporate environment.
Black Cipher Security should be given a break on this one as he probably did not know that the users he was interacting with are home users and wanted ERP tested from that perspective.
Last edited by a moderator: