NoVirusThanks OSArmor

D

Deleted member 65228

@Syafiq If you do not update to the latest versions then all you will end up doing is missing out on bug/vulnerability patches, protection enhancements and new user-experience features.

You don't have to update immediately after an update is released, but keeping track on progress and change-log history with updates will be in your best interest.
 

AtlBo

Level 28
Verified
Top Poster
Content Creator
Well-known
Dec 29, 2014
1,711
Digging a little bit deeper about NVT OSArmor. The video showing UAC protections on Windows 7 caused me to be curious if UAC and other areas of Windows that OSA protects should be classified as "unpatched" vulnerabilities. I would love to hear any input on this, not that I am looking for a reason to complain about MS. Attempting to classify OSA I think...:rolleyes: Having a hard time knowing how to classify the scope of the protections and also gauging a best configuration for the program.

I "think" OSArmor really could block many potential vulnerabilities too that aren't even known. Not sure about this however...
 
D

Deleted member 65228

I "think" OSArmor really could block many potential vulnerabilities too that aren't even known. Not sure about this however...
Due to how the product is designed its main capability stems around post-exploitation payload blocking IMO. Either way the product is useful and great, I like it a lot.

If your browser gets hit with a file-less RCE exploit from the web, NVT OSArmor is not going to be able to stop it. However, the post-exploitation payload might cause additional process creation instead of continuing code execution on the host environment via the browser process for the rest of the operation -> NVT OSArmor monitoring scope is now in action.

Bear in mind, things like registry operations would indirectly cause reg.exe to spawn, and NVT OSArmor monitors this as well (for example). So even without directly spawning another process, an operation performed by the payload could cause it... and thus lead to being blocked by NVT OSArmor.

Even if payload is not stopped immediately, better later than never... = less damage in the end.

Don't expect it to behave like other "Anti-Exploit", it doesn't patch memory to intercept on code execution flow nor scan memory for in-memory signatures... or things like call stack checking. It simply doesn't work like that. However because of how it works, it'll behave very light and won't manipulate 3rd party software, plus it is still useful. And should be compatible when combined with other AE. That way you can use one AE to cover those areas, and NVT OSArmor to focus on different things, and lock down the configuration a bit more to help cut off legs of an attackers payload.

Think of it like an Anti-Executable except it isn't an Anti-Executable but will automatically block process creation depending on the configuration. If the configuration has an enabled rule about bcdedit.exe, the command line will be checked when it is spawned (before the main thread of bcdedit.exe is resumed so it doesn't start any operation yet) and depending on that command line matching the rule in the configuration -> block process creation (as an example).
 

AtlBo

Level 28
Verified
Top Poster
Content Creator
Well-known
Dec 29, 2014
1,711
Think of it like an Anti-Executable except it isn't an Anti-Executable but will automatically block process creation depending on the configuration. If the configuration has an enabled rule about bcdedit.exe, the command line will be checked when it is spawned (before the main thread of bcdedit.exe is resumed so it doesn't start any operation yet) and depending on that command line matching the rule in the configuration -> block process creation (as an example).

Thanks @Opcode. Helps tremendously.

I tend to classify protections based on the scope of their coverage as in this covers script activity or this handles memory issues etc. or just consider X + Y + Z protections all covered when it comes to Comodo Firewall etc. Just trying to cover Umbra's layers. Well, OSArmor seems to cross so many barriers it's crazy. Normally, I would think of UAC bypasses as something MS would automatically patch, which adds to the puzzle for me. Anyway, OSArmor appears to cover so many potential vulnerabilities like these that it's hard for me to classify the program, because I guess I would expect MS to have fixed many of the issues that OSA protects against. Talking about W7 here, and I guess most of them are fixed in W10. Still, I would have expected MS to have fixed them in W7 too since it is still officially supported until 2020.

Could be I am off base about how to classify things like UAC bypasses, or it could be MS has patched most of the holes and others like MMC abuse and so on. I don't know much about MS patches that's for sure. Clearly not much was ever done in W7 about protection against wayward script activity.

If you have an opportunity, I would like to know if it's fair to say that memory exploitation is in its first stages always the result of malware abuse of a vulnerability in a program (i.e. browser etc.). Also, is exploitation always in the form of memory abuse? Thx for the helpful comments.
 

NoVirusThanks

From NoVirusThanks
Verified
Developer
Well-known
Aug 23, 2012
292
Here is a new v1.4 (pre-release) test62:
http://downloads.novirusthanks.org/files/osarmor_setup_1.4_test62.exe

*** Please do not share the download link, we will delete it when we'll release the official v1.4 ***

So far this is what's new compared to the previous pre-release:

+ Improved Block suspicious command-lines
+ Minor fixes and optimizations
+ Fixed some false positives

To install it, first uninstall the previous build, then reboot (not really needed but may help), and install the new build.

If you find any false positive or issue please let me know.

* The option "Block suspicious command-lines" contains an experimental rule, if you notice a FP let me know *

@l0rdraiden

The FP should be fixed now, thank you for sharing it.

@Opcode

Very useful and informative comments!
 

Syafiq

Level 11
Verified
Top Poster
Well-known
May 8, 2017
536
Date/Time: 05/05/2018 20:12:58
Process: [5988]C:\Windows\System32\rundll32.exe
Process MD5 Hash: 731A783A36A8E69A6434D19D98B12A09
Parent: [3832]C:\Windows\explorer.exe
Rule: BlockCPLApplets
Rule Name: Block execution of .cpl applets outside System folder
Command Line: "C:\Windows\system32\rundll32.exe" shell32.dll,Control_RunDLL PowerCfg.cpl @0,/editplan:381b4222-f694-41f0-9685-ff5bb260df2e
Signer:
Parent Signer: Microsoft Windows
User/Domain: Syafiq/DESKTOP-FFK9MV6
System File: True
Parent System File: True
Integrity Level: Medium
Parent Integrity Level: Medium
@NoVirusThanks
I have enabled the "block execution of cpl applets outside the system folder" but when i was opening the advanced power options in the control panel, it display an alert. Should I disable that options or exclude it?
 
F

ForgottenSeer 58943

NVT, I would recommend dropping all XP support.

Those 2 fools running XP over at Wilders and complaining about OSArmor not working properly aren't worth a single second of your development time. They are running systems from 2002 that should be thrown out. They probably take 30 minutes to load Chrome up.

A machine that is 900 times better can be purchased for $99 refurbished at Microcenter. It's time they be told the truth.. LET IT DIE BRO. Do yourself a favor, declare OSArmor as not supporting XP.
 
F

ForgottenSeer 58943

I don't even know how someone can seriously use Windows XP and even try to act like they know what they're doing with security... It's disgusting.

Forget NVT OSArmor if you're on Windows XP, you need to hire the Pentagon LOL

It drives me insane to see any developer waste 2 seconds on XP. Even worse, XP people seem to bring it up and talk like they are doing something edgy and unique, like Techno-Hipsters that drive around in 1987 Caprice Classics with Man Buns. When in reality they are only making themselves look foolish. One of the guys over there is complaining OSArmor adds latency to his PENTIUM 4 system..

You know what you tell that guy? If he insists on using a Pentium 4 then put a lightweight linux Distro on that box and go away.
 

mekelek

Level 28
Verified
Well-known
Feb 24, 2017
1,661
NVT, I would recommend dropping all XP support.

Those 2 fools running XP over at Wilders and complaining about OSArmor not working properly aren't worth a single second of your development time. They are running systems from 2002 that should be thrown out. They probably take 30 minutes to load Chrome up.

A machine that is 900 times better can be purchased for $99 refurbished at Microcenter. It's time they be told the truth.. LET IT DIE BRO. Do yourself a favor, declare OSArmor as not supporting XP.
they are so blinded that they flat out ignored my comment about hoping the uninstallment was done on their system and not OSArmor.
i absolutley agreed, wasted time and resource on fixing stuff for windows f. XP
 

NoVirusThanks

From NoVirusThanks
Verified
Developer
Well-known
Aug 23, 2012
292
Here is a new v1.4 (pre-release) test63:
http://downloads.novirusthanks.org/files/osarmor_setup_1.4_test63.exe

*** Please do not share the download link, we will delete it when we'll release the official v1.4 ***

So far this is what's new compared to the previous pre-release:

+ Improved OSArmor self defense (basic)
+ Improved Block suspicious command-lines
+ Fixed some false positives

To install it, first uninstall the previous build, then reboot (not really needed but may help), and install the new build.

If you find any false positive or issue please let me know.

@Syafiq

The FP should be fixed now, thanks for sharing it.

Should I disable that options or exclude it?

You should always try to exclude the blocked-event (if is a False Positive) instead of completely disable the entire protection option.

@ForgottenSeer 58943

Yeah, we'll discuss if continue XP support asap.
 

Carphedon

Level 1
Mar 2, 2018
11
I am using perfect privacy VPN and i have trouble getting the VPN manager to work with OSA (v1.4 (pre-release) test63) without disabling some crucial settings. The VPN manager makes an openvpn connection and then executes various scripts to force all programs through vpn, prevent ip leaks, set dns etc. Because the ip you get assigned changes most of the time i can not exclude these command lines.

I have attached the log file.
 

Attachments

  • VPN Manager Log.txt
    4 KB · Views: 442

NoVirusThanks

From NoVirusThanks
Verified
Developer
Well-known
Aug 23, 2012
292
Here is a new v1.4 (pre-release) test64:
http://downloads.novirusthanks.org/files/osarmor_setup_1.4_test64.exe

*** Please do not share the download link, we will delete it when we'll release the official v1.4 ***

So far this is what's new compared to the previous pre-release:

+ Improved Block suspicious processes
+ Improved Block execution of PowerShell malformed commands
+ Disabled by default "Block reg.exe from hijacking Registry startup entries"
+ Minor fixes and optimizations
+ Fixed some false positives

To install it, first uninstall the previous build, then reboot (not really needed but may help), and install the new build.

If you find any false positive or issue please let me know.

@Carphedon

Should be fixed now.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top