Serious Discussion TuxTalk - Eset Smart Security Premium Thread

I searched for an offline installer for ESET, found the site and downloaded Home Premium. It installs fine, but among the first steps when you start it, it asks for online verification/activation of Trial. Why can't they do it the old fashioned way and hide an encrypted date in the registry? That will tell them when the product has gone past trial period.

The difference in telemetry is minimal. With an online registration, you know how many trial users there are. You can easily get the number of trial users from the their web site download figures.
 
Last edited:
they also do PayPal
I have gone off PayPal because the way they used to work is deduct the purchase off my existing funds which I previously transferred to them. Now the directly deduct the purchase from my bank. No difference from using a debit card..
 
Last edited:
  • Like
Reactions: Sorrento
What I like about ESET is their user configurable HIPS rules. For me a product with no configurable rules is a no go - you rely on the vendor's detection. Some vendors think this and that does not merit separate detection due to their over-confidence in their own detection. If their detections are so good, we wouldn't have compromise after compromise of big corps. And red teams everywhere would be unemployed. And penetration test firms will be out of business. I prefer to play it safe and add persistence prevention to known registry keys and paths. That way I know a particular vector is covered. Otherwise it is one big black box. I am not saying that my rules offer better persistence detection than theirs, but extra rules that safeguards particular vectors are useful. For me blind trust in a vendor is suicidal.

For example, you can query for directories that are both writable and executable in \program files, \program files (x86), and \windows using SysInternals AccessChk. You will find that SetupMetrics under Edge, iirc, is one such directory (+ Chrome & derivatives) . When an attacker can write to a folder and also execute his wares you are in deep dodo. And I use SRP too, so user folders are covered for this scenario.

And as defenders we have to make use of AI. Ask for persistence registry keys and paths and you will get some. You will need to debug what AI's suggests because as we all know they hallucinate. But ESET offers logs of HIPS rules firing, so you can prune away or modify those that prevent normal operations. (for example I modified 4 out of 65 AI's registry offerings then the taskbar re-appeared. And most of them appeared reasonable)

As of my current very limited understanding, stopping the Persistence category of Mitre Attack SEEMS doable to a good extent. (in contrast to the Execution category) Not accounting for complex web based assets which we don't have.
 
Last edited:
Make sure to opt in for extended security updates for W10. Gives you an extra year.

If not, security support ends this month.
Thanks, that's been thought of, there won't be any problems until 2032 ;)
Capture.PNG