- Aug 2, 2015
- 4,286
This has wandered so far off from what the OP was asking
Best disable AutoRun and not plug-in devices you don't know where they came from, because scanning with an AV it can already be too late by then. Better be safe than sorryVery true my friend.
Thats why i recommend scanning all USB drives with an AV on a regular basis.
I had most of these done already, they are good settings, and stuff like this is what the OP was looking for (I believe)Enable PUA detection in Windows Defender:
Code:Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\MpEngine] "MpEnablePus"=dword:00000001
Enable UAC password prompt:
Code:Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System] "ConsentPromptBehaviorAdmin"=dword:00000001
Disable elevation for a unsigned applications:
Code:Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System] "ValidateAdminCodeSignatures"=dword:00000001
It has no impact on security but you can also disable modern UAC prompt:
Code:Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\LogonUI\TestHooks] "XamlCredUIAvailable"=dword:00000000
-Web exploit attacks
First Mac Malware Of 2017 DetectedJust use MacBook and you will not think about viruses anymore
(Mac) Security is just illusionNamed Quimitchin by Malwarebytes and called Fruitfly by Apple, the ‘new’ back door may actually have been lurking in the background of macOS for years, taking advantage of vulnerabilities in code that hasn’t been updated since the late 1990s, according to the antivirus software publisher’s blog post.
A masterclass in simplicity, the malware contains just two files designed to open a backdoor into the Macs it infects, letting it receive instructions from the hacker’s computer, known in the cybersecurity world as a command and control server (C&C)
Yes, especially kernel mode rootkits (32bit) are less common.PE Infectors, advanced kernel-mode (or even user-mode rootkits) aren't as common in the wild anymore
I would say that you can leave WD as your main AV, ditch EAM and implement Common Sense 2017 (if you weren't already)I had most of these done already, they are good settings, and stuff like this is what the OP was looking for (I believe)
This has got me thinking, I have EmsiSoft AM collecting dust. So what about those reg settings with Defender on periodic
scan, with EmsiSoft AM at the helm ?
No other software at all not even WFC, but windows firewall set so that I have to manually add rules ?
would that be as tight as I think it is ?
The System Service Dispatch Table is essentially a table containing pointer addresses which reside to areas in memory where the function stubs are, therefore when you lookup NtTerminateProcess in the SSDT you can find the pointer address for redirection to that function. The way SSDT hooking works is that these pointer addresses will be modified to the pointer address of your own function from within your own device driver, causing execution flow to redirect to your own function. Since it's system-wide, this means any code that calls NtTerminateProcess normally will end up leading to the SSDT to follow the pointer address, but it'll really lead to your own code. This means that SSDT hooking will affect kernel-mode code execution as well as user-mode programs - if you hook NtOpenProcess via the SSDT and then call NtOpenProcess from kernel-mode, your hook will still be triggered.(For those interested SSDT is the addressing table used to direct the application working at ring 3 (User mode) to the native API, and it is in a structure called KeServiceDescriptorTable. The native API are provided by the kernel to allow the API of the sub-systems (win32) to perform certain operations which are only possible in kernel mode.
In this table we find an array of pointers that point to these API.
So, in theory, it could not use the native API because it would be like to operate in kernel mode and, in fact, the kernel provides the working system of an application is: Application/Subsystem API/Native API/NT Kernel.
Phishing counts as social engineering, and phishing is completely unrelated to securing a Windows system in the sense the OP is referring too. Phishing attacks are malicious however they won't "harm" the system, they are there for the purpose of obtaining information through unethical means (social engineering, tricking you into believing you are giving information to a trusted service for example).social engineering, phishing
Every piece of software can be exploited because nothing is full-proof, as long as it's made by a human then it's vulnerable to human error which is only natural.Even with the best next generation security software there are always bugs to exploit.
You can patch an exploit however in some scenarios it can be a very tricky process because the last thing you want to do is open up another gap which was even worse than the first one which can be exploited by an attacker. If it is very tricky to exploit (time consuming or lack of internal details) then this will put many attackers off the job and will lead to them giving up eventually, however if an attacker is determined enough then the chances are they will not stop until they achieve their goal.Best you can do and hope for is to make it more expensive, time consuming and difficult for would be attackers.
That's not true at all. The only thing you need to do to protect yourself is make sure you make good decisions - this opens a whole sub-set of good security practices and can include anything from only visiting trusted websites, not opening e-mails from untrusted senders, not aimlessly clicking unknown links, not handling attachments you are unsure of, doing proper research before running new programs, etc.Honestly you need to practice defense in depth, layered security, and default deny to have any chance of protecting yourself.
I found the approach you described in your post to be quite interesting, good idea.This setup is very secure without any third party security programs, and everything (non desktop) is updated through Windows Updates. You can install new programs on SUA only from Windows Store, and there is no possibility to run/install new desktop programs on this account.
You can repair MBR easily as well with a boot disk/usbIf you format your hard disk with GPT, instead of MBR, you can easily recover from MBR attacks with the help of a good boot repair tool on CD or USB.
You can use one program for all Microsoft security thing (Hard_Configurator):
View attachment 135399
Common Sence 2017 is pretty good but have you looked at Common Sense Pre Alpha 2018 ?I would say that you can leave WD as your main AV, ditch EAM and implement Common Sense 2017 (if you weren't already)
Finally I had a little time to take a look at your softwareThanks for mentioning Hard_Configurator. The new version will be uploaded to GitHub soon.
It can be useful for people, who do not like messing with Windows Registry.
I downloaded it and I liked it, but one little thing: I couldn't get it to block powershell, although it blocked wscript just fine. What did I do wrong?You are welcome. Thanks for testing.