- Dec 26, 2019
- 287
Interestimg approach, anyway rundll32.exe as abused process is old news.
Off topic: are you French (coz I am)? Because most of your links are French stuff.
I'm Italian.
This setup configuration may put you and your device at risk!
We do not recommend that other members use this setup. We cannot be held responsible for problems that may occur to your device by using this security setup.
This computer configuration is using an unsupported operating system. If possible, we recommend to upgrade to an operating system that is supported by its developers to remain protected from the latest threats.
Interestimg approach, anyway rundll32.exe as abused process is old news.
Off topic: are you French (coz I am)? Because most of your links are French stuff.
Any malware can bypass signature if properly obfuscated and encrypted, make them fileless, signed and it is guaranteed to bypass.I would like to bring this 3D to your attention:
Mimikatz in the Wild: Bypassing Signature-Based Detections Using the “AK47 of Cyber”
Mimikatz in the Wild: Bypassing Signature-Based Detections Using the “AK47 of Cyber” April 4, 2019...www.wilderssecurity.com
Sampei Nihira,
Did you make a comparison of PaleMoon safety to other possible web browsers like K-Meleon, Maxthon 5, or Opera (ver. 36)? All are still patched for security on Windows XP.
Any malware can bypass signature if properly obfuscated and encrypted, make them fileless, signed and it is guaranteed to bypass.
About Mimikatz and lsass.exe, if you use a true anti-exploit or a soft protecting lsass.exe memory space like Appguard or the Excubit tool (forgot its name), you should be ok. However this is out if reach of most anti-exe (ERP, OSA, etc...) since they don't have any in-memory process protection (preventing lsass.exe or other processes to be read or modified).
This kind of attacks is the perfect example of anti-exe limitations, they are excellent at blocking malicious parent-child processes but it stop there. You can't just rely solely on them if you want them as main security tool (you need an anti-exploit alongside, i told this since ages).
Which after i quickly read, seems to involve the abuse of lsass.exe, which can be easily prevented by in-memory protection kind of software (unless i overlooked something while quickly reading)Those who have read 3D have understood that there are various ways and systems to do this.
Yes, there were some issues in the year 2016, for example:Stay away from Maxthon especially for privacy reasons.
...
Yes, there were some issues in the year 2016, for example:
Honestly, I read far worse things about Google Chrome, Avast, etc. Furthermore, I could not find anything suspicious about it after the year 2016 (the company is in the US). It looks like the safest browser for Windows XP and Vista (except maybe the PaleMoon).Chinese browser Maxthon grants admin rights to malware: researchers · TechNode
The company positioned its browser as being secure and private following the 2013 Edward Snowden scandal.technode.com
Best Most Secure And Safest Browser in 2020 – PrivacySniffs
privacysniffs.com
The cons are the extensions made by unknown people. So, I would rather use the Adguard DNS, or another safe DNS.
Don't hope too much, the actual rules are less strict than the ones I enforced when I was in charge of the security config section.@MT Security Staff
will reevaluate their assessment.
A kind of exception that confirms your rules.
With best regards.
Don't hope too much, the actual rules are less strict than the ones I enforced when I was in charge of the security config section.
So I don't see any exceptions being made for you. The tags aren't only made to rate your config, but also to inform other members about replicating it.
Those tags aren't considering the user skills or workarounds but only the items used.
XP is vulnerable, so risky is your config.
@MT Security Staff
will reevaluate their assessment.
I remember it, and the Umbra seal of approved.the actual rules are less strict than the ones I enforced when I was in charge of the security config section.
I think that it would be much easier to protect a Vista computer.
1. Windows XP (for advanced swimmers only) :
- Stronger design.
- The security patches are still available (manually via Server 2008).
- This is a rarely used Windows version.
- You can use Comodo Firewall or any AV + H_C to lock/unlock the computer in a few minutes.
View attachment 232414
2. Windows Vista (rarely used):
View attachment 232415
3. Windows 7:
View attachment 232416
But what are you interested in their assessment? The thing that should matter most to you is only one: you have been using your configuration for years, over time you have improved and mastered it. In all this time no virus or anything has ever gone through it. So for you (which you know how to use very well) it is more than good. That's all that matters.
Kon Tiki in the year 1947 crossed the Pacific to arrive Polynesia:
I think it's a matter of justice...
...I have read of Security Configurations that use W.10 which may be more at risk than mine.