We use Xcitium. But we layer also. Least privilege and so on. All lol bins blocked.
Can you PM me the attack files?
forums.comodo.com
Nothing is 100%, there is always a fine line of burdening users. Usability vs Security is a constant battle. We have always been trying to make sure we provide the best security for the usability. We can add many theoritical scenerios that are not a current threat in the wild that might negatively affect usability. However we are always looking for new ways to improve the security without affecting the user experience. We very much appreciate the good work Andy has done and we welcome and encourage more of these kind of POCs so that we can all improve as a community!
Andy, I think what everyone here is failing to say, is Thank you.Guys, your critique of Comodo does not help in this thread.
Any AV can be criticized, but people who use Comodo do not complain much.![]()
guys, im really sorry to be lost here but i was reading the entire post and i need to ask: is this something to really worry as a user?
I take Amendment 5Are you Comodo staff?
I take Amendment 5
I can test the current beta and proactive HIPS if you could send the samples.
Hello Andy can you repeat the ttest with the option checked: Detect embedded code at cmd ?
Heuristic analysis of the code alone may not yield anything
It's been a long time since I've been here![]()
I'm talking about the same test with hips checked as it was in the second video and the embedded code option checked
I wonder how it would turn out
View attachment 282162
You can never wake a person who pretends to be asleep.As explained, he used a script with LOLBins that cut Comodo's services.
No matter how many time you wash the coal, it's always dirty.You can never wake a person who pretends to be asleep.
Could this attack be blocked effectively by adding certain HIPS rules like (user) apps deny access to certain files or system resources. I'm wondering if one or more HIPS rules could defend this attack and if so which rules to add.
I wonder what the result of the test would be if you sent Containment to "Do Note Show Elevated Alerts" to Block with that ticked so it blocks any untrusted program rather than running in Containment. Something I used to use in my setup awhile back.Yes. But you would have to know the details of the attack.
Selecting do not show elevation alerts just runs the unrecognized file with the chosen option for the setting. Comodo trusts or allows the attack file because the user is starting it, not an unknown program. Containment settings don't matter because containment doesn't come into effect in this case.I wonder what the result of the test would be if you sent Containment to "Do Note Show Elevated Alerts" to Block with that ticked so it blocks any untrusted program rather than running in Containment. Something I used to use in my setup awhile back.