Dan sent me this and asked that I post it here. Hope it is still timely as it arrived several hours ago. Personally, I think the discussion here is easier to follow, and I understand both sides now better than reading the wilders thread. Please do not reply directly to me, I did not write it and I'm not posting it to defend it one way or the other. I do think back and forth of this discussion is a learning experience. /sk
@Umbra
You are twisting and cherry picking my words. I am not “pissed by the fact people
continuously saying AG is "awesome" or "better" than VS.” As I suggested in the
video description, I am TIRED of people wildly speculating that one product will
perform better than another product in certain tests.
If this was a promotional video to put VS in the best light, then I would not have
included the ERP test, and I could have easily made the video MUCH more dramatic.
Even if this was a promotional video… there is absolutely nothing wrong with clearly
demonstrating how your product is different from other products.
For example… BRN created this comparison matrix:
http://www.voodooshield.com/artwork/agcm.png
In this video:
The difference is that my video passes the truth test, and theirs does not. If
anyone believes that AG is the only product that will stop most or all of these
threats, they simply are uninformed.
This was simply a test that was performed to answer the question proposed in this
thread:
Is that true, that default deny security solutions can stop the EternalBlue & DoublePulsar attacks?
Instead of speculating, why not just get off of your ass and run the test? Come on
guys… 3 pages of speculation, and not a single test was performed… and we wonder why
the malware epidemic is only getting worse. I was under the impression that
Lockdown was not familiar enough with pen testing with Kali to get this attack to
work… and I was curious what would happen, so I ran the freaking test.
Andy Ful said: If you mastered enough Metasploit, that would be the simplest way to
perform EternalBlue & DoublePulsar attack.
Lockdown said: It will take time to learn Kali Linux. Just focusing on Kali Linux
instead of the standalones. So much is packed-into Kali.
Is that true, that default deny security solutions can stop the EternalBlue & DoublePulsar attacks?
And now we all know the result. It is that simple… isn’t that better than
speculating? Read the video description.
What almost everyone is failing to realize is that if EB is able to install a kernel
level backdoor (DP), it will have no problem creating a different malicious process.
The problem is that WannaCry demonstrated that adding a worm component to ransomware
made it spread like wildfire… and everyone is ignoring the fact that malware authors
are most likely going to be utilizing and enhancing this technique or similar
techniques to create copycat malware… it happens almost every time.
It is hilarious when people say “oh, that has been patched by Microsoft, so we do
not have to worry about it.” What they are completely misunderstanding is that this
test perfectly demonstrates their mechanism does not block worm attacks like this.
If you are going to be protecting a large enterprise with 10,000 endpoints... one of
two things must be occur:
1. Your endpoint software is able to defend against this kind of attack
OR
2. All 10,000 endpoints remain uninfected 100% of the time. This included mobile
devices brought in from the outside… you know, the ones you had on your home network
the night before, while your kid was poking around on the internet.
ANYTHING else is a pretentious assumption that your software is absolutely perfect,
and there will never be a breach.
@ SHvFl
We all know why I was banned from MT. An old admin, Littlebits wrote a fake review
on VS without even installing it, when we first came out. I stood up to him (and
tried to be as nice as possible, IMA), and he made sure I was banned. Either way, I
will never let anyone bully me, whether they are an admin or not.
More importantly… clicking allow, or lowering the security level to install,
disabled, or OFF in ANY security product does NOT demonstrate a bypass. This is not
just for VS… this is for ANY security software… I have no idea why you do not
understand this concept.
With that in mind… the EB/DP attack did not require ANY user interaction AT ALL…
NOTHING. That is why this attack is different… and there will be copycat attacks.
@Everyone
VS blocked the attack, but there are a couple of things that it could have certainly
done better (in this attack), and they are very easy to fix. This is true with ALL
of the products, but if I would have demonstrated this, then it would have appeared
as though I was picking on certain products.
The absolute truth is that when I heard how WannaCry was spreading like wildfire
because of this worm component, I had a horrible, horrible sinking feeling in my
stomach and was worried if I did everything correct in the code, and if VS actually
blocked EB / DP / WC. If other security vendors are not concerned about this
threat, that is their business.
I wish I had time to respond to everyone… but stuff like this takes crazy amounts of
time. I actually am probably not going to have anytime to reply on any forum for
quite some time. Besides, honestly, it gets kind of old when people speculate about
a test… then you take time to do the research and perform the test properly, then
when they see the results, if they do not like the outcome, you have to spend 3 days
explaining stuff to them, that they could easily either research or test on their
own.
No thanks… I would rather go to the park with Molly .
When MRG releases its final results, assuming that they further explain why this
attack requires security software vendor's immediate attention, I am certain people
will start to understand why I made the video.