D
Deleted member 178
Thread author
Hi guys ,
NoViruThanks , creators of the formidable anti-executable ExeRadarPro (aka ERP) has released a new tool (still in beta but functionning) called Smart Object Blocker.
you can find it here: NoVirusThanks Smart Object Blocker - NoVirusThanks
What is it ?
Smart Object Blocker (aka SOB) is an anti-executable like ERP , the difference is it also monitors Dll and drivers in addition of processes.
How it looks like?
at the moment it is just a basic interface, not even a GUI.
Is it heavy on system ?
not at all , you can't even feel it
How do we use it?
Actually, you have to write your own rules using wildcards in .db files , there is no popups to click , so it seems laborious to use (remember it is a beta); but once you get the trick , you will understand how powerful this product is.
there an example and explanation:
Personally i used those rules to block EVERY processes/dll/drivers located on my D: partition :
then i tested against a portable app (DNS Jumper) to simulate a malware (DNS jumper allows you to change the DNS setting of your computer , behavior often used by malwares), there the result:
It seems complicated to use...
for the moment , it is complicated because you don't have a GUI , but that will change in the future. Actually it is mostly a new toy for advanced users to play with
So what the benefit of SOB, i still don't get it?
SOB as said earlier will block any process/dll/drivers , those are components of any programs and malwares. since you can create personal and customized rules yourself ; you have TOTAL control of your system.
So i'm interested but i'm not an advanced user, im willing to learn; what should i do?
in your case , use a Virtual Machine or an old computer and install it, then try to learn how to write the rules.
you will have lot of explanations and example by following this thread on Wilders .
Conclusion
More i use it , more i like it ; i like to be in TOTAL CONTROL of my system without any resources hindrances.
This soft is very promising with endless possibilities.
NoViruThanks , creators of the formidable anti-executable ExeRadarPro (aka ERP) has released a new tool (still in beta but functionning) called Smart Object Blocker.
you can find it here: NoVirusThanks Smart Object Blocker - NoVirusThanks
What is it ?
Smart Object Blocker (aka SOB) is an anti-executable like ERP , the difference is it also monitors Dll and drivers in addition of processes.
NVT said:NoVirusThanks Smart Object Blocker is a valid approach to prevent malware and rootkit infections without requiring virus signatures or updates. It monitors in kernel-mode all processes, dlls and drivers loaded in the system, best bulletproof protection. The program is very stable and resources-friendly, you’ll not even notice it is installed in the system. With this awesome program you can create a whitelist and block all the rest (Lockdown Mode) or you can create a blacklist (Behavioral Mode), with support for exclusions, to block only specific objects. Block DLL injections. Supports all Microsoft Windows OS (32/64-bit).
How it looks like?
at the moment it is just a basic interface, not even a GUI.
NVT said:For ERP users, this is an enhanced ERP with no GUI controls, no alert mode, but with "only" Lockdown Mode and Behavioral Mode (with support for exclusions), plus it can monitor DLLs and drivers, so it is a very complete protection. You can create very smart rules, filtering almost every field of the to-be-loded object (process, commandline, hash, parent process, etc) with support for mixing/grouping rules, for example, you can allow Firefox to execute processes located in a particular folder, signed by a trusted vendor, and that match a specific command-line string. Moreover, you can easily share/combine rules with other users, thanks to the custom environment variables and aliases that we have created. Check the product page for more information.
Is it heavy on system ?
not at all , you can't even feel it
How do we use it?
Actually, you have to write your own rules using wildcards in .db files , there is no popups to click , so it seems laborious to use (remember it is a beta); but once you get the trick , you will understand how powerful this product is.
there an example and explanation:
NVT said:The program can be configured by editing the Configuration.ini file:
[Mode]
Type = Behavioral ---------------> Can be set to "Behavioral" (block objects based on rules) or "Lockdown" (allow objects based on rules)
ProtectionDisabled = n ---------------> Allows you to disable or enable the real-time protection, by default it is enabled
[Settings]
PassiveLogging = n ---------------> Passive logging allows you to test your rules, the objects are not blocked but just logged
BlockRulePath = %CURDIR%\Block ---------------> The folder where are located the .DB files (rules) for the Behavioral Mode
AllowRulePath = %CURDIR%\Allow ---------------> The folder where are located the .DB files (rules) for the Lockdown Mode
ExcludeRulePath = %CURDIR%\Exclude ---------------> The folder where are located the .DB files (rules) to handle the exclusions for Behavioral and Lockdown
LogEventsToFile = y ---------------> Allows you to save the events to a log file (enabled by default)
LogEventsPath = %CURDIR%\Logs ---------------> The folder where are saved the log files
Behavioral Mode uses these rules:
Block\Process.DB ---------------> Rules to block processes
Block\DLL.DB ---------------> Rules to block DLLs
Block\Driver.DB ---------------> Rules to block drivers
Exclude\Exclude-Behavioral.DB ---------------> Rules to handle exclusions
Lockdown Mode uses these files:
Allow\Process.DB ---------------> Rules to allow processes
Allow\DLL.DB ---------------> Rules to allow DLLs
Allow\Driver.DB ---------------> Rules to allow drivers
Exclude\Exclude-Lockdown.DB ---------------> Rules to handle exclusions
By default the program is set to Behavioral Mode.
To switch to Lockdown Mode you need to edit Configuration.ini and set:
Code:Type = Lockdown
Then restart the program for the changes to take effect.
The default rules on \Allow\Process.DB are these ones:
Code:[%PROCESS%: *:\WINDOWS\*] [%PROCESS%: %PROGRAMFILES%\*] [%PROCESS%: %PROGRAMFILESX86%\*]
That means all processes located in \Windows\, \Program Files\, \Program Files (x86)\ (and subfolders, note the * character) are allowed, all the rest is blocked.
You may need to add more rules based on the programs you have installed, for example, if you have Chrome installed, it needs to execute files located in AppData folder.
So you can add a new rule that allows updating of Chrome application:
Code:[%FILEPATH%: %LOCALAPPDATA%\Google\Chrome\*] [%SIGNER%: Google Inc]
All executable files located in %LOCALAPPDATA%\Google\Chrome\* and digitally signed by Google Inc are allowed to execute.
Personally i used those rules to block EVERY processes/dll/drivers located on my D: partition :
Code:
Block rules:
Process.db:
[%PROCESS%: D:\*]
[%FILEPATH%: D:\*]
Drivers.db:
[%FILE%: D:\*]
Dll.db:
[%FILE%: D:\*]
then i tested against a portable app (DNS Jumper) to simulate a malware (DNS jumper allows you to change the DNS setting of your computer , behavior often used by malwares), there the result:
It seems complicated to use...
for the moment , it is complicated because you don't have a GUI , but that will change in the future. Actually it is mostly a new toy for advanced users to play with
So what the benefit of SOB, i still don't get it?
SOB as said earlier will block any process/dll/drivers , those are components of any programs and malwares. since you can create personal and customized rules yourself ; you have TOTAL control of your system.
So i'm interested but i'm not an advanced user, im willing to learn; what should i do?
in your case , use a Virtual Machine or an old computer and install it, then try to learn how to write the rules.
you will have lot of explanations and example by following this thread on Wilders .
Conclusion
More i use it , more i like it ; i like to be in TOTAL CONTROL of my system without any resources hindrances.
This soft is very promising with endless possibilities.
Last edited by a moderator: