- Nov 18, 2015
- 105
- Content source
- https://www.youtube.com/watch?v=tFiw8JQxyO4&t=0s
Windows users pay your salaryThe real joke is on Windows 10 users.
LOL.... indeed, without them, he would have nothing to do...Windows users pay your salary
Horse and pony show... Not even close to realistic. No user is going to run a batch script of hundreds of samples from their desktop at once on their system.btw, that was a cool way to execute that files. never saw that from a youtuber.
If anyone wants to test a setup like this against a couple good packs of nasty zero-days, I would love to see the results.
Right. I think most AVs would do very well in this environment. My point is that Defender can be sufficient, if used in the right environment.I would love to see those results as well as seeing the same from all other consumer products tested that way, bet it would be an eye opening experience for many. After they see this, i would like to also remind them, that the chances of them seeing these same results at their home, behind a router would be slim at best. It is so easy to get wrapped up into a mind set here in the forum of needing tons of security.
My point is that Defender can be sufficient, if used in the right environment.
Unpatched software and social engineering are the 2 most likely reasons a user would get exploited, even in a corporate environment. Not becoming lazy in maintenance and learning safer/informed habits will negate a good deal of this.The right environment being one without any true Zero-Day malware...
So why not put it to the test? Go ahead, prove me wrong.The right environment being one without any true Zero-Day malware...
Yeah, I know it's not really your cup of tea. But if anyone else would be willing to test it out in an environment similar to the one I suggested, it would be interesting to see if Windows security can be smashed on its own ground.Shum26- I've done WD, UAC, and SUA bypass videos in the past. No one really cared then and I have no reasonable expectation that any would care now. If you want to do such a video, go for it. Personally I've given up.
All I want Is to collect my bonus this year, retire and be a Ski Bum. No computer, Security, or malware thoughts forever...
SysHardener + any AV will be probably very effective especially on SUA. This a simple but effective solution. Of course, the simple solutions have also some cons.Yeah, I know it's not really your cup of tea. But if anyone else would be willing to test it out in an environment similar to the one I suggested, it would be interesting to see if Windows security can be smashed on its own ground.
WD ASR rules play well both with SRP and SysHardener. Also, the Exploit Guard program for popular vulnerable applications would be welcome.Software Restriction Policy is the super-power of native Windows security. But the new ASR rules, as far as I have seen so far, are also very good. I think folks should check them out, before they dismiss Defender with a wave of their hand.
I am looking forward to your Exploit Guard settings in the next version of Hard_Configurator,/ConfigureDefender, if you can do that.WD ASR rules play well both with SRP and SysHardener. Also, the Exploit Guard program for popular vulnerable applications would be welcome.
I can see that such application would be welcome, but this will require much testing. So the plan is as follows (group work):I am looking forward to your Exploit Guard settings in the next version of Hard_Configurator,/ConfigureDefender, if you can do that.