- Jan 4, 2016
- 1,022
Your right, and I am sooo glad they are showing their true colors in public for all to seeHey guys, you are very cruel to Dan.
I am not so cruel. The test showed, that Metasploit attack with EternalBlue & DoublePulsar exploits, cannot run the meterpreter payload on machine with VoodooShield Always ON mode. In my opinion, it does not prove much about EternalBlue & DoublePulsar exploits. This video was also commented on:
Is that true, that default deny security solutions can stop the EternalBlue & DoublePulsar attacks?
yes , i discussed with him about the video, sadly he put it as a defensive response from a post praising AG... however i don't deny that the attack is working (but only if it get the proper conditions)1). Dan was being trolled by a few about metaploit bypasses and I think this culminated in his response with this video. It is a shame that he had to lower himself to do this, but the resulting video was well done
Exact, it doesn't show the whole picture, just a part of it. Average users won't understand (just by looking at the video) what is happening and what must have happened before , what they see is just a product bypassed; no explanations, nothing.2). Umbra- I feel your pain (and like the analogies). As you intimate, topics such as this should be confined to places other than Home User forums (no offense to anyone out there!). The fact that such attacks are not only targeted but must have a number of things in place before being successful is something that is never discussed.
indeed , no home users with up-to-date OS will ever get hit by this exploit today.A person concentrating on this topic is like someone worried about crossing 7th Ave in Manhattan on the Middle Night of Spring and getting hit by an Elephant, while ignoring that one may get creamed by a Taxi the rest of the year.
Exact.So I'm sure that some vendors (and I DON'T mean VS) will try to tout that they protect against such a specific attack, they will also ignore that they will be breached by a simple Worm coded by some Pre-Pubescent Blackhat Wannabe.
Send me a photo of you with itI particularly like my Palo Alto shirt which I wear when I run and look devastatingly HOT in (not being conceited here, just calling a Spade a Spade).
Could not agree more CS, you need to post more while under the influenceI probably shouldn't be commenting on this now as I'm on pain Meds for a twisted knee from running a and few glasses of wine (probably not something wise to do) but nonetheless:
1). Dan was being trolled by a few about metaploit bypasses and I think this culminated in his response with this video. It is a shame that he had to lower himself to do this, but the resulting video was well done (although I wish he consulted me as I had a Miles Davis Blues tune that would have fit nicely).
2). Umbra- I feel your pain (and like the analogies). As you intimate, topics such as this should be confined to places other than Home User forums (no offense to anyone out there!). The fact that such attacks are not only targeted but must have a number of things in place before being successful is something that is never discussed. A person concentrating on this topic is like someone worried about crossing 7th Ave in Manhattan on the Middle Night of Spring and getting hit by an Elephant, while ignoring that one may get creamed by a Taxi the rest of the year.
So I'm sure that some vendors (and I DON'T mean VS) will try to tout that they protect against such a specific attack, they will also ignore that they will be breached by a simple Worm coded by some Pre-Pubescent Blackhat Wannabe.
I agree, and going after Dan either directly or indirectly on a forum he does not access or visit, where he can't respond is a cowardly move.I have to defend again Dan's video. He showed that a payload (meterpreter) can be executed on target machines. One can replace the meterpreter DLL with any malware coded in the form of DLL. So in fact, the video proves that such malware files can be executed remotely using remote kernel exploit as a bridge.
My concern is of a different kind. Detailed analyses of EternalBlue & DoublePulsar code, strongly suggest that both avoid rundll32.exe to execute DLLs. If so, then blocking rundll32.exe does not block payload execution, except when the payload after start, loads additional DLL in the standard way (using rundll32.exe).
I also agree with @cruelsister that this subject may be too technical for Home User forums, and in fact, home users can hardly be targets (except when using large public networks).
He actually asked to post here dude and it's not anyone fault except himself if he doesn't have an account here. The same things we posted here are posted on his topic on the other site anw.I agree, and going after Dan either directly or indirectly on a forum he does not access or visit, where he can't respond is a cowardly move.
As stated over at WS this should be addressed with Dan via Email or PM on sites he frequents.
He actually asked to post here dude and it's not anyone fault except himself if he doesn't have an account here. The same things we posted here are posted on his topic on the other site anw.
You must agree to the fact that he made a video promoting his product and bashing on others with a scenario he didn't even accept as a bypass to his product in the past. Pretty low if you ask me.
Respectfully, no it's not, know your history, he was banned here, he has alluded to this fact many times.He actually asked to post here dude and it's not anyone fault except himself if he doesn't have an account here.