- Jan 17, 2014
- 627
Without Comodo:
Comodo doing bad things to bad rabbit:
Source:
Thanks!
Comodo doing bad things to bad rabbit:
Source:
Thanks!
@cruelsister ask Melhi to pay you in return via emerald bracelets or high class pair of shoes fit with itComodo really should leave the Videos to me (and all I want is something that sparkles green...)
But not all security providers have free sandbox and that is activated by default to something unknown.Any sandbox is a good mechanism against ransomware.
I totally agree with you.In my opinion CF should come with CruelSister settings by default!
When we say sandbox-evading, it doesn't mean the malware will go out, it means the malware will shut down itself because it recognizes being in a sandbox. And for Comodo, if the malware managed to get out, you still have the BB and HIPS.My opinions.
So far I have been watching these malware test videos showing the malware defeated by the prowess of Comodo's sandbox. The problems here are
1) The malware being tested are non-sandbox evading type. Try testing Comodo's sandbox with some sandbox-evading malware and see whether it can stop the malware.
All depend of the user paranoia level, generally those installing a sandbox, do it for a reason, not just to look at it.2) In real life, how many people actually would download some software and run in a sandbox before committing to disk? And especially for those legit software. Take the recent CCleaner infection for example. A legit software resulting in an APT that took a long time before it was discovered. Would you run this in a sandbox before committing to disk?
The purpose of a sandbox, is to isolate ANY files (not only malware) first, check them, and if clean, commit them.3) In such malware tests the test subjects are already known i.e. they are malware. In real life how many people really know that the downloaded file is a malware because such file may masquerade as a needed legit file
Yes, i installed a sandbox for some friends, told them how to use it, and how to check files they download via Virus total, they stopped getting infected.So, is a sandbox REALLY useful in everyday use for a normal user?
But there are users who would shut down Comodo's HIPS and its BB is pretty weak. If I'm not wrong CS's setup disabled the HIPS too.When we say sandbox-evading, it doesn't mean the malware will go out, it means the malware will shut down itself because it recognizes being in a sandbox. And for Comodo, if the malware managed to get out, you still have the BB and HIPS.
All depend of the user paranoia level, generally those installing a sandbox, do it for a reason, not just to look at it.
The purpose of a sandbox, is to isolate ANY files (not only malware) first, check them, and if clean, commit them.
Yes, i installed a sandbox for some friends, told them how to use it, and how to check files they download via Virus total, they stopped getting infected.
it's easy if people take 2 minutes to scan on Virus Total. you'll have an idea what it's all about.But there are users who would shut down Comodo's HIPS and its BB is pretty weak. If I'm not wrong CS's setup disabled the HIPS too.
Correct. Like I mentioned how many would do that especially for legit software
I'm not saying having a sb is no good. I'm questioning the use practicality aspect of it. IMO a HIPS(heuristics-based) + BB(behavioral-based) is a better and more practical approach than using a sb noting that each technology (sb, HIPS, BB) has its limitations
It's easier and faster for your HIPS and/or BB to kick in and warn you of a malware when you run a software. No need 2 minutes.it's easy if people take 2 minutes to scan on Virus Total. you'll have an idea what it's all about.
Any sandbox is a good mechanism against ransomware.
That's provided the sandbox don't meet a sandbox-evading ransomwareFortiSandbox snagged this day one on download when we tested it. (recently industry certification FSBX was hitting 99.5% on incoming zero days) The pre-screen flagged it for further evaluation, it was bounced around the FortiSandbox and blocked as a potential new outbreak. I sometimes wonder if Sandboxes/APT evaluation appliances/services will be in consumer grade gear in the future to stop trash like this.
The HIPS isn't really shut down, it can only be put a sleep and will react if the BB can't give a solution.But there are users who would shut down Comodo's HIPS and its BB is pretty weak. If I'm not wrong CS's setup disabled the HIPS too.
HIPS and BB would detect unusual behavior.Correct. Like I mentioned how many would do that especially for legit software
Those are layers, all depend of the user to use them or not.I'm not saying having a sb is no good. I'm questioning the use practicality aspect of it. IMO a HIPS(heuristics-based) + BB(behavioral-based) is a better and more practical approach than using a sb noting that each technology (sb, HIPS, BB) has its limitations
Comodo's BB is weak. Can it compare to BB from EAM, BitDefender, Norton etc?The HIPS isn't really shut down, it can only be put a sleep and will react if the BB can't give a solution.
HIPS and BB would detect unusual behavior.
Those are layers, all depend of the user to use them or not.
Let's see if the translator lets me express what I mean.It's easier and faster for your HIPS and/or BB to kick in and warn you of a malware when you run a software. No need 2 minutes.
So you are saying EAM failed to detect your 3 malware? Did you re-code the existing malware or are they the latest zero-days?Let's see if the translator lets me express what I mean.
I have been testing malware today. The first thing I did was upload them to Virus Total. "The execution" Emsisoft were left without detecting 3 malwares, because they were malwares, however, Comodo put them in the Sandbox. then scan with Hitman pro and effectively Kaspersky's base gave it as malware. In other words, the litter box is stronger for me than a behavior detector.