InternetChicken
New Member
- Jul 16, 2012
- 519
Thanks for testing!Littlebits said:I went into the forum to test the urls, the latest 120928 Exploit Kit URLs are all already blocked by Avast, most are also blocked by Google Chrome and Firefox.
We haven't tried it, but if you do please post your findings!InternetChicken said:Hi ZeroVulnLabs
Question Any issue with ExploitShield Browser Edition and Sandboxie ?
ExploitShield Browser Edition shields browsers and add-ons (Java, PDF, media players, Flash, Shockwave, etc.).arsenaloyal said:OK so is this only specifically for browsers or does is also block exploits in apps like MS office suite ? thanks.
ExploitShield Corporate Edition
This product is currently in closed, private beta. Watch this page or our press releases for announcements regarding the availability of the product. To participate in the beta program please contact us from your corporate email account. Requests from non-corporate addresses will be ignored.
It might still be a few months until we open the ExploitShield Corporate Edition beta program. Send us an email to info@ from your corporate mailbox if you want to be on the list.arsenaloyal said:just saw that,too bad,.... so does this mean that its not available for personal and home use ?
InternetChicken said:Hi ZeroVulnLabs
Question Any issue with ExploitShield Browser Edition and Sandboxie ?
ZeroVulnLabs said:It might still be a few months until we open the ExploitShield Corporate Edition beta program. Send us an email to info@ from your corporate mailbox if you want to be on the list.arsenaloyal said:just saw that,too bad,.... so does this mean that its not available for personal and home use ?
ZeroVulnLabs said:Thanks for testing!Littlebits said:I went into the forum to test the urls, the latest 120928 Exploit Kit URLs are all already blocked by Avast, most are also blocked by Google Chrome and Firefox.
Avast and Chrome are blocking those URLs by blacklisting the URL itself as those URLs are normally already 24 hours or older. One way of testing is to disable the URL blacklisting features of your other security programs so you can allow the browser to hit the exploit. Then you will see how ExploitShield behaves against exploits.
We add new URLs normally on a daily basis but mostly on a "whenever-we-get-some-spare-time" basis which is not very often.
We haven't tried it, but if you do please post your findings!InternetChicken said:Hi ZeroVulnLabs
Question Any issue with ExploitShield Browser Edition and Sandboxie ?
You are mistaken. Neither AV nor browser provides exploit blocking. They provide blacklisting-based URL blocking, which is extremely different. Confusing both would be a big mistake. Blacklisting relies on previous knowledge and analysis of a URL's maliciousness before it is added to the blacklist. This means a few patient zero infections, time wasted on the URL discovery, time wasted on the URL analysis and time wasted on the blacklisting signature being published.Littlebits said:The main problem with Exploit Shield is it will have to offer something unique. If your browser and/or AV can already block exploits, there really isn't anything to benefit from using it.
madyrocksin said:just a question, why it needs internet connection using svchost??
It shouldn't use svchost.exe for any connectivity. Can you please PM me the details of why you think it does?madyrocksin said:I think my question got unnoticed
ZeroVulnLabs said:You are mistaken. Neither AV nor browser provides exploit blocking. They provide blacklisting-based URL blocking, which is extremely different. Confusing both would be a big mistake. Blacklisting relies on previous knowledge and analysis of a URL's maliciousness before it is added to the blacklist. This means a few patient zero infections, time wasted on the URL discovery, time wasted on the URL analysis and time wasted on the blacklisting signature being published.Littlebits said:The main problem with Exploit Shield is it will have to offer something unique. If your browser and/or AV can already block exploits, there really isn't anything to benefit from using it.
EDIT: it's actually very easy to test if you keep a watch out on MDL or similar sites for new "exploit kit" URLs being published. Als you can use metasploit to test the same exploits that exploit kits such as Blackhole use.
Actually advanced users are less likely to encounter an exploit which bypasses protection since they usually have much more updated software components (less vulnerabilities) and many more security layers.Littlebits said:Well here is another problem, if an advanced user can not find a zero day exploit on a webpage when browsing then what are the odds that a novice user might accidentally visit that site?
Wow, you would think that being in a forum where security-conscious users constantly upload undetected malware and malicious URLs which have low detection by traditional blacklisting security would know better. Ironic isn't it.Littlebits said:It makes me wonder if users upload the malware links to create paranoia.
Those are not anti-exploit techniques, those are feature/functionality limitations and the vast majority of regular, non computer saavy users, don't use them because they are not install-and-forget.Littlebits said:And yes browsers do have extensions that can disable flash, Java, scripts, iFrames, etc. and provide exploit protection.
Yes you should use Secunia or something similar to keep all your software up-to-date and also an up-to-date AV to reduce the infection risk. ExploitShield is by no means a replacement for keeping your software up-to-date.Earth said:It is an interesting idea, but what about using Secunia PSI to keep software updated to prevent most exploits from occurring?
Is ExploitShield targeted at more for Corporate environments rather than general consumer users? And would ExploitShield protect Mac and Linux users too, say in a future release?