Serious Discussion Three Unpatched Vulnerabilities Plague Comodo. Documented Online.

Would you use vulnerable and outdated software, when alternatives exist?

  • Yes

  • No


Results are only viewable after voting.
Status
Not open for further replies.
Comodo defence is impenetrable... unless you have the capabilities of a zero-day exploit using "D"LL hijacking! 😉😛😊
The offence is not bad either. We move the discussion in an antagonist/protagonist sort of way and the discussion becomes like an Indian series, which the people love to hate and hate to love.

 
DLL hijacking can be countered. You check your PATH for writable directories. You make sure the app's own directory is not writable.
It can mainly be countered by SAC now (because usually malicious dll will be unsigned, unless code signing abuse was applied) but also, in a programmatical way behavioural monitoring (cloud based) can contain information about the Process-DLL relationships (extracted through telemetry) and detect anomalies. But DLL hijacking is just one way to abuse trusted process to load malicious code.
 
explain the other ways please.
Loading code behind trusted processes is facilitated in a few ways usually:
T1055.001 - DLL injection
T1574.001/002 - DLL sideloading and hijacking which we discussed
T1055.0012 - process hollowing
T1055.0013 - process doppelganging
T1055.003 Thread execution hijacking
T1055.002 - pe injection under a process (very widespread).

The whole Mitre 1055 covers techniques for masquerading less than safe code under trusted facade.
 
Loading code behind trusted processes is facilitated in a few ways usually:
T1055.001 - DLL injection
T1574.001/002 - DLL sideloading and hijacking which we discussed
T1055.0012 - process hollowing
T1055.0013 - process doppelganging
T1055.003 Thread execution hijacking
T1055.002 - pe injection under a process (very widespread).
Thanks
 
Is that 1 vote yours, or am I mistaken?
@rashmi, we know it was your vote.

IMG_2551.gif
 
@rashmi Why don't you play Superman? :) Or maybe you want to tone it down like 0Pathy. Like, you activate ARP blocking, block PowerShell to prevent attackers from delivering Metasploit payloads, another thing would be to monitor that folder ../../../ProgramData/Microsoft/Windows/Start Menu/Programs/Startup/ maybe you have another card up your sleeve? (y)
 
Status
Not open for further replies.