Matousec: Proactive Security Challenge 64 (bits)

Discussion in 'other anti-malware software' started by fax, Jun 22, 2013.

Thread Status:
Not open for further replies.
  1. Solarlynx

    Solarlynx Registered Member

    Joined:
    Jun 25, 2011
    Posts:
    2,015
    :thumbd:
    hell, i tried to run their suit
     
    Last edited: Oct 21, 2013
  2. ifacedown

    ifacedown Registered Member

    Joined:
    Oct 12, 2013
    Posts:
    121
    Location:
    Philippines
    the 2013 16.30.0.1843 version
     
  3. fax

    fax Registered Member

    Joined:
    May 30, 2005
    Posts:
    3,898
    Location:
    localhost
    http://www.matousec.com/projects/proactive-security-challenge-64/results.php

     
  4. co22

    co22 Registered Member

    Joined:
    Nov 22, 2011
    Posts:
    411
    Location:
    router
    http://www.matousec.com/projects/proactive-security-challenge-64/results.php
     
  5. fax

    fax Registered Member

    Joined:
    May 30, 2005
    Posts:
    3,898
    Location:
    localhost
    http://www.matousec.com/projects/proactive-security-challenge-64/


     
  6. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
  7. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
  8. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
    As guest said, this is a test of HIPS, and also spying/leaking.

    From http://www.matousec.com/projects/proactive-security-challenge-64/:
    You should use caution when using these tests on a behavioral blocker. A behavior blocker may notice Action 1 and Action 2, but only alert after seeing both of those actions performed by the same program.

    IMHO the testing level methodology used is demonstrably awful. For example, consider ZoneAlarm Free AF. On test #1, it scored 90%; on test #6 it scored 40%. If the tests in test #6 had been performed first, then ZoneAlarm Free AF would have flunked the first level and ended up with a very low overall score.
     
    Last edited: Feb 3, 2014
  9. justenough

    justenough Registered Member

    Joined:
    May 13, 2010
    Posts:
    1,549
    Because of the arbitrary methodology of the cut-off points of their levels their final results seem misleading to me.
     
  10. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
    I agree. Levels might be ok if the first levels are the easiest, but I haven't seen evidence that that is the case.
     
  11. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
    Follow-up to post #58:
     
  12. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
    Here's an alphabetized list of all the techniques used:

    binary planting
    code injection
    COM interface exploitation
    DDE exploitation
    direct network access
    disk location exploitation
    DLL injection
    file/directory manipulation
    graphics API exploitation
    in-process data substitution
    indirect network access
    keyboard API exploitation
    network API exploitation
    network management API exploitation
    parent process control bypassing
    registry key/value manipulation
    registry location exploitation
    remote process handles manipulation
    remote process manipulation
    remote process memory manipulation
    remote thread creation
    remote thread manipulation
    system object manipulation
    system service exploitation
    trusted process manipulation
    windows clipboard API exploitation
    Windows Filtering Platform API exploitation
    Windows Management Instrumentation API exploitation
    windows messages exploitation
    windows/event hooking exploitation
     
  13. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
    Here is a good introduction to leak testing from 2007. I haven't found a good newer reference yet.
     
  14. ance

    ance formerly: fmon

    Joined:
    May 5, 2013
    Posts:
    1,359
    Wow, still the same useless tests. :D If you have enough money your application can be retested again and again (until it's number one). :D :p
     
  15. fax

    fax Registered Member

    Joined:
    May 30, 2005
    Posts:
    3,898
    Location:
    localhost
    Yeap, main weaknesses of these tests have been discussed at lenght many times in the past 4-5 years. There are several long threads about it including comments from experts. So, good to make a quick search on "matousec" to find them to avoid opening this can of worms again and again. ;)
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.