Hypersight Rootkit Detector VIPS

Discussion in 'other anti-malware software' started by Meriadoc, Feb 24, 2008.

Thread Status:
Not open for further replies.
  1. lucas1985

    lucas1985 Retired Moderator

    Joined:
    Nov 9, 2006
    Posts:
    4,047
    Location:
    France, May 1968
    - SAS, CureIt, Prevx CSI.
    - Hijackthis log at a malware cleaning forum.
    - Full wipe and reinstall.
     
  2. Kees1958

    Kees1958 Registered Member

    Joined:
    Jul 8, 2006
    Posts:
    5,857
    As last option I suppose :D
     
  3. Ilya Rabinovich

    Ilya Rabinovich Developer

    Joined:
    Sep 13, 2005
    Posts:
    1,543
    I use following tools when I cure my friend's computers: Gmer, RootkitUnhooker, AVZ. But those tools are, mostly, rely on the brains&experience of their driver.:D If I were not really techy user I would use an anti-malware helpers forums from the ASAP list.
     
  4. aigle

    aigle Registered Member

    Joined:
    Dec 14, 2005
    Posts:
    11,164
    Location:
    UK / Pakistan
    I will not trust cleaning of a heavily infected PC esp rootkits. Few malwares are other story.
     
  5. Ilya Rabinovich

    Ilya Rabinovich Developer

    Joined:
    Sep 13, 2005
    Posts:
    1,543
    I never met a rootkit that could resists me more then a half an hour :)
     
  6. aigle

    aigle Registered Member

    Joined:
    Dec 14, 2005
    Posts:
    11,164
    Location:
    UK / Pakistan
    But I can,t find u each time i have to clean the rootkits.:D
    BTW have u ever met Rustock C?:D :D
     
  7. Ilya Rabinovich

    Ilya Rabinovich Developer

    Joined:
    Sep 13, 2005
    Posts:
    1,543
    You bet! :D
     
  8. aigle

    aigle Registered Member

    Joined:
    Dec 14, 2005
    Posts:
    11,164
    Location:
    UK / Pakistan
    Ilya, I edited my post.:)
     
  9. Ilya Rabinovich

    Ilya Rabinovich Developer

    Joined:
    Sep 13, 2005
    Posts:
    1,543
    No, I don't.
     
  10. aigle

    aigle Registered Member

    Joined:
    Dec 14, 2005
    Posts:
    11,164
    Location:
    UK / Pakistan
    May be it was there!:doubt:
     
  11. lucas1985

    lucas1985 Retired Moderator

    Joined:
    Nov 9, 2006
    Posts:
    4,047
    Location:
    France, May 1968
    Or maybe it never existed :doubt:
     
  12. aigle

    aigle Registered Member

    Joined:
    Dec 14, 2005
    Posts:
    11,164
    Location:
    UK / Pakistan
    May be, may be, mayyyyy be!
    Who knows?:rolleyes:
     
  13. lucas1985

    lucas1985 Retired Moderator

    Joined:
    Nov 9, 2006
    Posts:
    4,047
    Location:
    France, May 1968
    SystemJunkie :D
     
  14. aigle

    aigle Registered Member

    Joined:
    Dec 14, 2005
    Posts:
    11,164
    Location:
    UK / Pakistan
    lol, right said!
     
  15. SystemJunkie

    SystemJunkie Resident Conspiracy Theorist

    Joined:
    Mar 3, 2006
    Posts:
    1,500
    Location:
    Germany
    I met Rustock.C, I was live experiment I guess. :D :D ;) ;) ;) I got used to cyberwar. Most massive spam attacks were around june 2007, but where rooted this indian spam nonsense?
     
    Last edited: Mar 2, 2008
  16. lucas1985

    lucas1985 Retired Moderator

    Joined:
    Nov 9, 2006
    Posts:
    4,047
    Location:
    France, May 1968
    Indian spam?
     
  17. SystemJunkie

    SystemJunkie Resident Conspiracy Theorist

    Joined:
    Mar 3, 2006
    Posts:
    1,500
    Location:
    Germany
    Yes the latest spam attacks were filled with indian names and contents as mark. I created a pretty effective spam filter during this time so probably they lost interest.
     
    Last edited: Mar 2, 2008
  18. lucas1985

    lucas1985 Retired Moderator

    Joined:
    Nov 9, 2006
    Posts:
    4,047
    Location:
    France, May 1968
    Strange :doubt:
     
  19. SystemJunkie

    SystemJunkie Resident Conspiracy Theorist

    Joined:
    Mar 3, 2006
    Posts:
    1,500
    Location:
    Germany
    They mainly use these Mailers
    in 2008: X-Mailer: The Bat and
    in 2007: Eudora 7.x.

    Spambot killer India
     
    Last edited: Mar 3, 2008
  20. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,559
    Location:
    The Netherlands
    @ System Junkie, can you (or someone else) perhaps answer this question? Nothing personal but it´s just that some guys act like they know a lot, but when more technical questions are asked, it stays awfully quited. Or even funnier, you get to hear things like, "well, you woulnd´t understand it anyway"! :D
     
  21. Kees1958

    Kees1958 Registered Member

    Joined:
    Jul 8, 2006
    Posts:
    5,857
    http://en.wikipedia.org/wiki/Ring_(computer_security)

    Anyone else tried the virtual machine capacity of their CPU? With Securable you can check whether yor CPU has teh capacity, often a bios setup is needed to enable it.

    Ilya what is your opnion on this HIPS. From a marketing standpoint it is always good to tell people that they have a feature they do not use at the moment (digs deep into european/american christian believes that you should not waist things) and that for only (small amount say 15 dollars) you can be secured.

    Regards K
     
    Last edited: Mar 5, 2008
  22. Ilya Rabinovich

    Ilya Rabinovich Developer

    Joined:
    Sep 13, 2005
    Posts:
    1,543
    I would say:
    1. It is not a HIPS as it can't resists against regular malware.
    2. It has very limited capabilities.
    3. The main feature of it is to catch new hipervisor's installation.
     
  23. SystemJunkie

    SystemJunkie Resident Conspiracy Theorist

    Joined:
    Mar 3, 2006
    Posts:
    1,500
    Location:
    Germany
    I think there are by far too many attack ranges to say this protection will help you against all malware/rootkits.

    It seems so, but is it really able to catch hypervisors? This tool stands on very thin legs actually.. lets wait and see.
     
  24. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,559
    Location:
    The Netherlands
    Yes the main function seems to be to protect Windows/security tool from rootkits, so in a way it is a HIPS. My question is, do you think it´s possible to make classical HIPS or sandbox work as hypervisor? Can you control all system calls (file system + registry) as hypervisor?

    Yes probably, but I just wondered why KAV is monitoring this, in theory it should be able to monitor and stop even the most nasty rootkits from modifying the system, or perhaps this is only possible for hypervisors?

    I don´t see why not? Of course it will become the main target for hackers.
     
  25. Ilya Rabinovich

    Ilya Rabinovich Developer

    Joined:
    Sep 13, 2005
    Posts:
    1,543
    It can't protect against rootkits.

    Both questions- no.
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.