- Apr 24, 2014
- 20
there is some way to bypass Noscript with XSS , however HMPA will be more helpful.I've heard of some of those techniques (process hollowing, dll injection, thread execution injection). Don't know much about subject, but I hope that HMPA and NoScript extension are ready to do their job if necessary.
Exactly , no need to be a genius, just need to practice. Anyway those using these techniques don't need to go as far as this , a simple "attractive" link on some popular social sites , which download a dropper and you will have hundreds of victims ready to be exploited. Only an handful of people uses and know how to use an anti-exe/SRP/HIPS.XSS > exploited browser > scan the system > adjust the payload and drop it into the target as DLL> install reflective DLL loader in target's memory > run DLL.
All the above can be applied automatically from the malicious web page. The similar scenarios are possible, when exploiting any software. Many security programs (including SRP and Anti-Exe) cannot fight such attacks, even if they can control DLLs in a standard way (like NVT SOB).
Excellent pdf , thx .
there is some way to bypass Noscript with XSS , however HMPA will be more helpful.
Excellent pdf , thx .
not saying that using Reflective Dll Injection which contains embedded meterpreters/frameworks that can be loaded directly in memory would bypass classic anti-exe.
@Andy Ful , thanks for the explanations! I learned a lot. So it sounds like sandboxing the browser is a better protection than trying to control the DLLs.XSS > exploited browser > scan the system > adjust the payload and drop it into the target as DLL> install reflective DLL loader in target's memory > run DLL
All the above can be applied automatically from the malicious web page. The similar scenarios are possible, when exploiting any software. Many security programs (including SRP and Anti-Exe) cannot fight such attacks, even if they can control DLLs in a standard way (like NVT SOB).
Edit.
SRP and Anti-Exe are not an anti-exploit solutions. They can only try to stop the malware on the post-exploitation stage. The above scenario will fail on an updated system (Windows/Software updated), especially when using Standard User Account.
The same can be said about applications opening vulnerable files, like: document readers, document editors, media players, etc.@Andy Ful , thanks for the explanations! I learned a lot. So it sounds like sandboxing the browser is a better protection than trying to control the DLLs.
So the Windows 10 default apps will do it for most everything you mentioned, except for Word docs. To handle the Word docs, I have installed LibreOffice inside of the default sandbox of Sandboxie, so if I download a Word doc, I can open it virtualized.The same can be said about applications opening vulnerable files, like: document readers, document editors, media players, etc.
Personally, I use Universal Applications (AppContainer) from Windows Store for that, and Office Online.
yes herad of that too, thanksi will check it out to see the symantec explanationIn page 13, there is a link that takes you to another paper. It describes the possibilities within WMI and its classes.
indeed, it is why using a sandbox is a main part of my security strategy. Bypassing a sandbox is surely possible, but not so easy and worth the time/resources.@Andy Ful , thanks for the explanations! I learned a lot. So it sounds like sandboxing the browser is a better protection than trying to control the DLLs.
Same here, im amazed by all those Win10 users that despise the very secure Metro Apps and rather use some crappy 3rd party party software without secureing them via a sandbox or a anti-exploit.The same can be said about applications opening vulnerable files, like: document readers, document editors, media players, etc.
Personally, I use Universal Applications (AppContainer) from Windows Store for that, and Office Online.
Detecting and blocking powershell.exe isn't enough anymore, i can launch a battery of powershell scripts without even using powershell.exe , and without any files even touching the disk. all being in memory. Anti-exe won't even react.I know Voodooshield and Kaspersky Free Antivirus detect Powershell execution because I run a scheduled task to download my hosts file using Powershell single -command. Most security products don't throw any red flags at the fact that I download a strange file directly from the Internet into a protected system32/driver/etc folder except those two which often makes me wonder what other malware could do with a SYSTEM token.
How would you compare it to Kaspersky IS?ok, since I used f-secure I did some search and found a white paper about DEEPGUARD! seems it can detect these attacks@shmu26 keep calm and buy an F-secure
https://www.f-secure.com/documents/996508/1030745/deepguard_whitepaper.pdf
2.1 Process monitoring
Applications are monitored for a number of suspicious actions, including (but not limited to): y Modifying the Windows registry y Editing files in certain critical system directories y Injecting code in another process’s space y Attempting to hide processes or replicate themselves As legitimate programs will also perform such actions from time to time, DeepGuard does not red-flag a program on the basis of a single action but instead watches for multiple suspicious operations. Once a critical threshold of suspect actions is reached, DeepGuard will block the process from continuing. If available, file reputation and prevalence rating information from the Security Cloud is taken into account to determine this critical threshold. For example, DeepGuard treats files with a low-prevalence rating more aggressively by lowering the critical threshold of suspicious actions that can be performed before the file is blocked
the deep guard is more than that(just take a look at pdf)!so worth the price
These tools can Prevent it! but They can't detect (if I'm not wrong)it if that thing reaches your windows.AV/Firewall/HIPS and a Sandbox