cruelsister
Level 43
Thread author
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Forum Veteran
Has cruelsister become officially their brand ambassador?
yeah good point almost all test are related to click to run we need to see more about hacking a computer with metasploit kali and other stuff any hacker can make a raspberry like device connected in public wifi to automatically hack connected computersHas anybody seen the test of any Comodo product, when fighting NotPetya (Wannacry, EternalPot, etc.) infecting the local network? The firewall used in Comodo products should be very useful when the laptop is temporarily connected to the public network or Enterprise network. But, I did not see the test showing how Comodo's firewall, HIPS and Sandbox can fight the malware attacking computers connected to the infected network.
From the other tests, we know that SRP and Anti-exe products cannot stop the kernel backdoor infecting the local network. Some security products can stop the infection via network filtering or memory scan.
I rather think of the possibility, when the attacker wants to steal passwords from people connected to the public network, using Metasploit or FuzzBunch. One can make a payload in the form of DLL and use the kernel backdoor (like DoublePulsar) to execute it on the target computer. The payload can steal passwords like in Zoltan video (ETERNALBLUE / DOUBLEPULSAR / PEDDLECHEAP):...
Note that exploits such as these are not the malware vectors themselves- they essentially just open a path for the actual malware to spread.
...
This is not so simple. In the case I mentioned, DoublePulsar is activating the malware DLL without using the standard methods (like rundll32.exe, or calling LoadLibrary API). In my example, DoublePulsar is simply nonstandard reflective DLL loader, that is already running in the kernel. If the payload DLL is self sufficient and does not spawn new processes, then Comodo will have a problem. It would be not wise to believe that Comodo should block/contain the malware DLL, without testing it....
I know that the Metasploit console videos are impressive to watch, but understand that they never look at what is actually occurring on the potentially infected endpoint. For a malware dll to activate, something HAS to act on it for the dll to be activated (like by rundll32) ...
I think the same.I think comodo firewall is better than emsisoft firewall imo