Y
yigido
So the trusted sample now blacklisted
I see. Their summary is flawed then. It should have shown last human expert analyst feedback date.Click on "Human Expert Analysis" tab.
Human Expert Analysis Results
Analysis Start Date: 2016-10-22 22:32:14 ( 8 days ago )
Analysis End Date: 2016-10-22 22:46:34 ( 8 days ago )
File Upload Date: 2016-10-22 20:25:13 ( 8 days ago )
Update Date: 2016-10-30 17:50:55 ( 26 minutes ago )
Human Expert Analyst Feedback: malware
Verdict: Malware
Comodo sandbox is much more sophisticated than Sandboxie. If someone can bypass Comodo Sandbox (which most likely evolves around real virtualisation via utilisation of Intel VM-x/AMD SVM - like a real virtual machine does) then they can bypass Sandboxie.Sandboxie is the answer (+ Qihoo with all engines enabled)
Title of this thread: "Comodo FW bypass the Sandbox...", first part of your post: "Sandboxie is the answer".I know how sandboxie works, that's why I said +Qihoo.
I tried a sample of Sandboxie and outside the video, everything was ok but if you delete trustworthy supplier in Comodo will take all OK. Comodo's whitelist leaky power suppliers and unfortunately had vetted.Title of this thread: "Comodo FW bypass the Sandbox...", first part of your post: "Sandboxie is the answer".
Maybe I just misunderstood what you really meant at first, but how I read your post is telling me that you said Sandboxie would be a better alternate to Comodo Sandbox in terms of security (since this is about a bypass).
Sorry if I misunderstood you.
Comodo let any file run if the file verdict is "safe". You can the file in Comodo sandbox manually, just like you did with Sandboxie.I tried a sample of Sandboxie and outside the video, everything was ok but if you delete trustworthy supplier in Comodo will take all OK. Comodo's whitelist leaky power suppliers and unfortunately had vetted.
I see. Their summary is flawed then. It should have shown last human expert analyst feedback date.
But if you trust AutoSandbox so in this case you .....come off badly .-))@Wave should I reming you some of my PMs
Comodo let any file run if the file verdict is "safe". You can the file in Comodo sandbox manually, just like you did with Sandboxie.
It should be automatic and showing the date of the last verdict. If it's not automatic then it should become automatic. Anw not really important. What i want to know is why the first guy marked it as safe but i am sure no Comodo guy will appear here and tell me.They had to react quickly to the public thing what if this technique nini exploits against corporations using Comodo .-)))
This is why we have "layered" configurations > CISBut if you trust AutoSandbox so in this case you .....come off badly .-))
what layer of CIS would have blocked it, if it had trusted status?This is why we have "layered" configurations > CIS
You can keep HIPS and Virsucope enabled.what layer of CIS would have blocked it, if it had trusted status?
I can only hope that Viruscope would catch it, because if it has trusted status, then HIPS will stay pretty quietYou can keep HIPS and Virsucope enabled.
Deselct the option on "Viruscope Settings" #Analyze only sandboxed process
So Virucope will checking its actions. and good new, Viruscope in CIS 10 is more powerful than CIS 8
Title of this thread: "Comodo FW bypass the Sandbox...", first part of your post: "Sandboxie is the answer".
Maybe I just misunderstood what you really meant at first, but how I read your post is telling me that you said Sandboxie would be a better alternate to Comodo Sandbox in terms of security (since this is about a bypass).
Sorry if I misunderstood you.
I can't believe you just said this... You clearly don't understand how Sandboxie said like you said you did or you wouldn't have said this.It is, if you download and install Sandboxie and then download the sample and test it you will see . I also said Qihoo because it has amazing HIPS/BB so if anything will bypass Qihoo will get it.
Comodo sandbox is much more sophisticated than Sandboxie. If someone can bypass Comodo Sandbox (which most likely evolves around real virtualisation via utilisation of Intel VM-x/AMD SVM - like a real virtual machine does) then they can bypass Sandboxie.
Sandboxie is the answer (+ Qihoo with all engines enabled)
Title of this thread: "Comodo FW bypass the Sandbox...", first part of your post: "Sandboxie is the answer".