5
509322
I wouldn't mind hitting the lotto, but basically, all that discussion about the risk, on the thread I linked to, was extreme paranoia?
If you get really stinkin' rich don't forget me !
I wouldn't mind hitting the lotto, but basically, all that discussion about the risk, on the thread I linked to, was extreme paranoia?
Nope, read carefully my post earlier. (and also the articles/threads you are quoting)As for the factual point, I think you got me wrong. I meant like this:
1 I am in SUA.
2 I unknowingly execute a malware file.
3 It is loaded in memory, but cannot perform the attack, because it lacks permissions.
4 While still in SUA, I enter my admin password, in order to run my macrium reflect backup job.
5 Bang! the malware got elevated permissions, and pawns my computer.
Is this right?
Issue to you, so honestly, i don't care. Everybody here knows how i am from the start.As for the respect issue: I usually read articles and posts carefully before responding, and if I don't understand a point, I often engage in long discussions with other forum members who know more, until I get it. Once I get the point, I do share it with others.
So if I post something you disagree with, go right ahead and disagree, but with a little common decency, please.
EDIT: My request is that you show common decency to all MT posters, not just me. It is a general issue.]
Yep, beginners/average security forums members get their paranoia levels skyrocketting after reading (and 90% of the time not understanding) every PoC articles; then go posting "but if that blablabla , if this blablabla, we are owned !"So maybe all the 3 and 4 letter security agencies of the world are already using it. So what if that is true ? It's not something that should knock your security socks off.
Yep, beginners/average security forums members get their paranoia levels skyrocketting after reading (and 90% of the time not understanding) every PoC articles; then go posting "but if that blablabla , if this blablabla, we are owned !"
Yep, beginners/average security forums members get their paranoia levels skyrocketting after reading (and 90% of the time not understanding) every PoC articles; then go posting "but if that blablabla , if this blablabla, we are owned !"
The source of this article are :Okay, I finally found it.
There is a thread that discusses the split-token issue with SUA. Please explain the issue in plain terms, so that all (even me) can understand.
Removing User Admin Rights Mitigates 94% of All Critical Microsoft Vulnerabilities
Right! Many information on web is explained in very difficult ways. Can't understand those complex technical words. To a non native english person, it becomes even harder. So many times I end up misunderstanding or not understanding at all.It is because most infos on the web (and elsewhere) are not explained in practical, easily understood terms for the non-IT professional. Hell, there are IT pros with PhDs that scratch their heads too. It's the lack of readily accessible, easy to understand infos.
Thanks once again to @Andy Ful for interesting and understandable info!The source of this article are :
Tyranid's Lair: Reading Your Way Around UAC (Part 1)
Tyranid's Lair: Reading Your Way Around UAC (Part 2)
Tyranid's Lair: Reading Your Way Around UAC (Part 3)
The conclusion about SUA:
"What about Over-The-Shoulder elevation, where you need to supply a username and password of a different user, does that suffer from the same problem? Due to the design of UAC those "Other User" processes also have the same Logon Session SID access rights so a normal, non-admin user can access the elevated token in the same way. Admittedly just having the token isn't necessarily exploitable, but attacks only get better, would you be willing to take the bet that it's not exploitable?"
The author pointed out the theoretical elevation vulnerability when supplying credentials on SUA. It could be exploited (maybe). But, there is known vulnerability related to stealing credentials on SUA. The Malware is running in the background and waiting. When you try to elevate something, then it hides the UAC prompt and shows the fake one. After stealing credentials, it elevates without problems. Windows has a policy (and reg tweak) to prevent this vulnerability - if activated, then you must press CTRL-ALT-DEL to show the credentials window.
Imo if you need to write admin password while SUA then you are using it wrong. All admin related work should be done with an admin account when needed. More experienced members here can explain it better why that's the case.
Edit: I forgot to say, I am using SUA.
Indeed, don't forget SUA is about risks mitigation, not supposed to stop all attacks .Then, there is a lot of malware which works properly without admin privilegies
I changed my vote to "yes".Many MalwareTips members (like me) treat their computer as experimental lab, so they often need admin rights. Default deny protection is also my favorite. And of course, using SUA if far away of bullet proof security.
But it is also true that default deny protection can be for many users far more frustrating than SUA!
SUA is still the most efficient solution, for people who do not need frequently admin rights.
Edit1.
Here is some statistics (again), let's look at it in the context of the 0-day malware:
I know many antivirus solutions that have worse statistics on Admin account.
- About 80% malware run with the rights higher than standard user.
- 86% of Critical vulnerabilities affecting Windows could be mitigated by removing admin rights.
- 99.5% of all vulnerabilities in Internet Explorer could be mitigated by removing admin rights.
- 82% of vulnerabilities affecting Microsoft Office could be mitigated by removing admin rights.
- 85% of Remote Code Execution vulnerabilities could be mitigated by removing admin rights.
- 82% of Critical vulnerabilities affecting Windows 10 could be mitigated by removing admin rights.
- 63% of all Microsoft vulnerabilities reported in 2015 could be mitigated by removing admin rights.
Edit2.
Every security solution is stronger on SUA as compared to Admin account.
That is the best thing you could do, you said you need admin account to use Hebrew character, doesn't Win10 support it ? or you need a dedicated software?I changed my vote to "yes".
The story is I gave in to Microsoft. They are aggressively pushing the new Hebrew keyboard layout, so I decided I would learn it, and I gave up on the legacy keyboard layout. Everything comes with a price.That is the best thing you could do, you said you need admin account to use Hebrew character, doesn't Win10 support it ? or you need a dedicated software?