- Jan 9, 2017
- 468
@Umbra. Sure! & Soon it block you power on your PC - Sorry Offtopic.
HIPS rules for the application but those rules are independent of the sandbox and therefore won't affect the sandbox.
And what about the exploit that runs only in memory can somehow stop Comodo in this case? Thank you for clarifying use your settings.About sandboxing browsers- Yes, Comodo does offer this, but its usefulness depends on how you have the rest of CF setup. With my settings, sandboxing the browsers does not really offer very much.
For example, let's consider a recently popular exploit- this one actually composed of two items, ransomware AND a Pony info stealer. What must be remembered (and all too often is not) is that any exploit, in order to infect your system, MUST act locally By this I mean that some payload(s) have to be transferred onto your system to have the desired malicious effect. In this case we would have two separate payloads, the ransomware and pony, both of which will be sandboxed no matter if the browser is virtualized or not. I've shown enough in the past that CF just laughs at ransomware, so tis will not be any issue; and the info stealer being in the box cannot transmit out. And as with any malware of the info stealing type, it can collect all the information it wants. but as long as it cannot transmit this information to me (I mean the Blackhat), who really cares?
. but as long as it cannot transmit this information to me (I mean the Blackhat), who really cares?
this is a valid concern.And what about the exploit that runs only in memory
if your software and OS are updated, you don't have a lot to worry about.this is a valid concern.
a browser exploit utilizing a flash vulnerability, for instance, could potentially access and run a command line tool like powershell. It could then compromise the system in various ways. Here are a few that I know about:
1 disable COMODO and other defenses
2 load DLLs, which COMODO does not monitor
3 schedule a payload to run at the next reboot, as service, before COMODO protection kicks in.
Hi, as a defense against you suggest .-)
Yeah, I remember, but all credit due sis, if you can do it, others can too, there are no exclusiveActually this is not a valid concern. Before malware can do any of those things a payload must be able to run. As things like Powershell are just triggers for the payload, they can run as much as they want as long as anything that follows is virtualized.
However I think that Shmu may be referring to a RAT that I coded and used in previous videos. This one did indeed drop a dll and stopped Comodo on reboot. But as this file was signed with a High liberated certificate it would have gotten past anything. This guy was the Nightmare Scenario and only existed for the purpose of my videos (and has long since been deleted from reality).
if I had better sense, I would not argue with people who know a lot more than I do, and CS is definitely one of those people.Actually this is not a valid concern. Before malware can do any of those things a payload must be able to run. As things like Powershell are just triggers for the payload, they can run as much as they want as long as anything that follows is virtualized.
However I think that Shmu may be referring to a RAT that I coded and used in previous videos. This one did indeed drop a dll and stopped Comodo on reboot. But as this file was signed with a High liberated certificate it would have gotten past anything. This guy was the Nightmare Scenario and only existed for the purpose of my videos (and has long since been deleted from reality).
Thanks for the info ,...ill leave them tickedMercy- Trust me in that unticking these boxes (unless a person has a specific need to do so) is not a good thing. It will essentially sandbox anything that you want to use (not really, but close enough to be no nevermind).
Granted, if one comes across malware that uses a stolen signed certificate this would be a bad thing. But these are normally jumped on immediately by security vendors- even Comodo. There are some that would want to limit this method of attack by reducing the amount of Vendors that are trusted. With CF this list can be easily edited. If you have interested in doing this, please google "Comodo and Trusted Vendors List" - with the quotation marks! This will bring up a video I did last July that highlights the process.
Are there any specific videos/tutorials addressing the above issues?I did not elaborate on the various Sandbox levels,
nor the differences in Safe vs Custom Firewall modes
since these topics have been covered previously.
I believe Custom's pure default-deny and Safe Mode has Comodo's whitelist but I never really tested it since I found it too annoying and I just stuck to minor deviations from defaults.Are there any specific videos/tutorials addressing the above issues?
Sounds logical.