cruelsister
Level 43
Thread author
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Forum Veteran
- Content source
- https://www.youtube.com/watch?v=x6STbXn365k
Same outcome with WHHL tools fully tricked out. A thing can't stop what a thing can't see...The same outcome when using the full tools inside WHHL?
This is true for AV, which has to see and identify the file as malicious to stop.Same outcome with WHHL tools fully tricked out. A thing can't stop what a thing can't see...
Same outcome with WHHL tools fully tricked out. A thing can't stop what a thing can't see...
The most aggressive and protective one among ASR rules; it blocks the installer of PeaZip and Media player classic if recently released, just for being 1-day old and not that prevalent, in addition to not being signed of course.Block executable files from running unless they meet a prevalence, age, or trusted list criteria
The most aggressive and protective one among ASR rules; it blocks the installer of PeaZip and Media player classic if recently released, just for being 1-day old and not that prevalent.
Is there any browser extension, any AV browser extension, NextDNS filter setting (Block NRD's) that would have the potential to stop this type of exploit at the browser level, as this file was already on the desktop?These malicious files aren't in the normal executable (exe) form, but instead can be from Utube videos, mp3's or txt files. They avoid detection by being heavily obfuscated.....
Is there any browser extension, any AV browser extension, NextDNS filter setting (Block NRD's) that would have the potential to stop this type of exploit at the browser level, as this file was already on the desktop?
To bypass the script rules of AppLocker.instead of using the batch script, the shortcut was used
To bypass the script rules of AppLocker.
Yes; alsmot all the new attacks start with LNK file.Using shortcuts is more popular nowadays than two years ago
But AppLocker has not rules for LNK files, only executable files, windows installers, package app files, and script files!The attack can be blocked by the AppLocker even when using a shortcut
But AppLocker has not rules for LNK files, only executable files, windows installers, package app files, and script files!
If the file was originating from the Internet, opening the shortcut would trigger an alert.
Your questions beg this question: Where does the file originate from? This is the issue I have with this kind of testing.How could the initial shortcut land on the desktop where shortcuts are whitelisted by WHHLight?
Which is why I posted my question as well. Or, in AV-Comparatives speak, Real World Protection cp. to Malware Protection.Your questions beg this question: Where does the file originate from? This is the issue I have with this kind of testing.
Fair warning, the last time I brought this up, it didn't go well for me. People can get a bit 'pile-on' about it.Your questions beg this question: Where does the file originate from? This is the issue I have with this kind of testing.
No matter. People will be people.Fair warning, the last time I brought this up, it didn't go well for me. People can get a bit 'pile-on' about it.![]()