- Apr 13, 2013
- 3,224
Hi Andy! Not meaning in any way to divert from an illuminating thread, but when you refer to an UAC bypass, do you mean at the Default level, at Always Notify level, or both?Still cannot find any working UAC bypass
m
Please provide comments and solutions that are helpful to the author of this topic.
Hi Andy! Not meaning in any way to divert from an illuminating thread, but when you refer to an UAC bypass, do you mean at the Default level, at Always Notify level, or both?Still cannot find any working UAC bypass
Hi,Hi Andy! Not meaning in any way to divert from an illuminating thread, but when you refer to an UAC bypass, do you mean at the Default level, at Always Notify level, or both?
m
All components mentioned by me were strictly related to Defender and the attack (SmartScreen, UAC). It seems that you in three posts talked more about it than me in all my posts.How many times have you mentioned other Windows Security components in this thread? So many times in fact, that I thought we were talking about Windows Security. And this is not the only thread this happens on.
I am sure you are aware, but just in case....if you hit the Windows key and just type UAC, you will get an option for UAC settings. It is there where you can change the level of UAC. Interestingly enough, for me it says the default is at max?? Usually it's one step down. I am not sure if this is new with 20h2, or if it's because I am on a standard account and I changed it to max already?? Either way if you weren't sure that's how you could change the level if you wanted to. Now back to our regular scheduled show "bashing WD....." lol jkHi,
I could not find any (Default level or Always Notify). Anyway, I did not try all possibilities.
I actually did not mention a single Windows Security component. In fact, the only component I mentioned was SRP, which has been deprecated by Microsoft so it is not part of Windows Security. I used the term Windows Security simply because you mentioned other Windows Security components.All components mentioned by me were strictly related to Defender and the attack (SmartScreen, UAC). It seems that you in three posts talked more about it than me in all my posts.
If using other browser, with the Windows Defender Browser Protection extension, how much protection do we loose compared to Edge?If the Home User uses Defender + Edge with SmartScreen and PUA protection then the protection is so close to the commercial Home AVs, that there is no reason to change the AV. The same is true for any popular AV installed on the computer in the home environment. The reason is not that the protection is bulletproof, but that the difference in protection is very small - many times smaller compared to infections caused by user's habits and behavior.
WD Browser Protection has not fared as well as other extensions such as Malwarebytes Browser Guard or Bitdefender Trafficlight in @Evjl's Rain 's testing:If using other browser, with the Windows Defender Browser Protection extension, how much protection do we loose compared to Edge?
Someone already told me it's not quite the same, but didn't specify what exactly.
Yeah, but my question was very different. I want to know the comparison between WD Browser Protection and Edge. WD Browser Protection is supposed to bring Edge's protection to other browsers. Is it the same as Edge? Or if not, what does Edge have that WD Browser Protection does not. Regarding Smart Screen and Windows Defender, of course.WD Browser Protection has not fares as well as other extensions such as Malwarebytes Browser Guard or Bitdefender Trafficlight in @Evjl's Rain 's testing:
Q&A - [Updated 29/12/2018] Browser extension comparison: Malwares and Phishings
Yes you are correct, I realized that after I posted it sorry about that. Andy may know better, but my understanding is the browser extension is not quite as effective as smartscreen. Specifically at blocking downloads, also I can't find the posts but if I remember correctly the url blocking wasn't as good as smartscreen. Again, I await Andy's response.Yeah, but my question was very different. I want to know the comparison between WD Browser Protection and Edge. WD Browser Protection is supposed to bring Edge's protection to other browsers. Is it the same as Edge? Or if not, what does Edge have that WD Browser Protection does not. Regarding Smart Screen and Windows Defender, of course.
Yeah, maybe it was you, or Gandalf_The_Grey who told me exactly that. I would like to hear from @Andy Ful exactly what is missing.Yes you are correct, I realized that after I posted it sorry about that. Andy may know better, but my understanding is the browser extension is not quite as effective as smartscreen.
I do not know. The tests were done a long time ago. I do not know any reliable tests about it.Yeah, maybe it was you, or Gandalf_The_Grey who told me exactly that. I would like to hear from @Andy Ful exactly what is missing.
"The Microsoft Defender Browser Protection extension for Google Chrome allows you to add an additional layer of protection when browsing online, powered by the same trusted intelligence found in Microsoft Edge. The extension alerts you about known malicious links, and gives you a clear path back to safety."I do not know. The tests were done a long time ago. I do not know any reliable tests about it.
It does not. But in theory, it should use the same blacklist as SmartScreen. Anyway, the theory can be different from the real world. Edge is a special web browser because it is well integrated with Defender....
I've read somewhere that it enables Smart Screen on the browsers.
Why do you consider Edge so special?
So, if someone uses other browser, it would make more sense to use other AV?It does not. But in theory, it should use the same blacklist as SmartScreen. Anyway, the theory can be different from the real world. Edge is a special web browser because it is well integrated with Defender.
No. It would make more sense to use Edge (joke).So, if someone uses other browser, it would make more sense to use other AV?
After changing the initial AutoIt script to BAT script, the Defender is defeated again. As usual, introducing some scripting methods to the infection chain (instead of executables), can increase the success of the attack. The infection chain is rather complicated, so it is not probable in the widespread attacks. But, it can be used in the targeted attacks via drive-by downloads or spear phishing.Finally, I completed the POC by adding UAC bypass (but not for MAX UAC setting) based on autoelevation of Microsoft trusted executable. All known bypasses were patched by Microsoft recently or detected by Defender, so I did some research and modified one bypass discovered in the last year. The POC with UAC bypass worked well when initiated by the AutoIt script. The DLL hijacking was successful and then UAC was bypassed. Defender suspended the POC twice for 10 seconds to check the executables in the cloud, but in the end, the POC disabled Defender and executed the payload.
Next, I compiled the AutoIt script and put all executables in one EXE installer (made by NSIS). After execution, the new executables were suspended for 10 seconds and behavior-based modules detected them in the cloud as Trojan:Win32/Fuerboos.B!cl and Trojan:Win32/Wacatac.B!ml.
This example shows the difference between the home-made tests and in-the-wild samples.
If I will have some time, then maybe I will try to replace the initial AutoIt script with BAT script.