Bouncer (previously Tuersteher Light)

Discussion in 'other anti-malware software' started by MrBrian, Jan 25, 2014.

  1. Martin_C

    Martin_C Registered Member

    Joined:
    Dec 4, 2014
    Posts:
    525
    Microsoft has already fixed these.
    The Enigma0x3 UAC bypasses are already fixed as of build 15031.
    (All credits to hfiref0x / EP_X0FF for tracking and testing all the UAC improvements Microsoft are implementing)
     
  2. 4Shizzle

    4Shizzle Registered Member

    Joined:
    May 27, 2015
    Posts:
    179
    Location:
    Europe
    On what operating system? On Windows 8.1 (fully patched) it is not. I can execute sample exploit using EVENTVWR.EXE and it still works. I added blacklist rule to my configuration until it is clear under what conditions it wont be possible to misuse EVENTVWR.EXE (I dont need this executable).
     
  3. guest

    guest Guest

    Good, they have fixed it with the newest build :thumb:
     
  4. FleischmannTV

    FleischmannTV Registered Member

    Joined:
    Apr 7, 2013
    Posts:
    1,094
    Location:
    Germany
    Blacklisting event viewer instead of using a standard user account. Gotta love those security tweakers. Always priceless.
     
  5. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    Unfortunately not all of us can use a standard user account
     
  6. boredog

    boredog Registered Member

    Joined:
    Feb 1, 2015
    Posts:
    2,499
    "(All credits to hfiref0x / EP_X0FF for tracking and testing all the UAC improvements Microsoft are implementing)"

    " Gotta love those security tweakers. Always priceless."

    Wow I haven't seen that name in a while.
    I just remember him saying he went to work for MS a few years ago.
    Like cruelsister says. those old hackers ( famous rootkit writers)get hired really fast by companies. more so if they are young.
     
  7. EASTER

    EASTER Registered Member

    Joined:
    Jul 28, 2007
    Posts:
    11,126
    Location:
    U.S.A. (South)
    Of Rootkit Unhooker Fame for 32bit mainly XP systems. Remember that tool of his and MP_ART very well.

    They also did a POC named Unreal that was a hidden RK. Interesting that EP_X0FF is still heavily involved in Windows. KOOL
     
  8. 4Shizzle

    4Shizzle Registered Member

    Joined:
    May 27, 2015
    Posts:
    179
    Location:
    Europe
    Exactly, we all know we should, but reality proofs that in many cases people do (or can)not :)
     
  9. 4Shizzle

    4Shizzle Registered Member

    Joined:
    May 27, 2015
    Posts:
    179
    Location:
    Europe
    Ah yeah, it was somewhere arounds 2006 if I remember right. But there was also some controversys around that Rootkit Unhooker if I remember right?!
     
  10. paulderdash

    paulderdash Registered Member

    Joined:
    Dec 27, 2013
    Posts:
    4,644
    Location:
    Under a bushel ...
    So due for release (to non-Insiders) from April 2017?
     
  11. EASTER

    EASTER Registered Member

    Joined:
    Jul 28, 2007
    Posts:
    11,126
    Location:
    U.S.A. (South)
    The only controversy I remember is that it worked! It was the snappiest and most instant eviction tool of pulling out rootkit (other malware) code lodged in the SDDT Table and other areas, at least on XP. Never seen anything perform as fast since. Don't know much about anything like it when x64 and Ring0 with patchguard plus signing of MS drivers made it obsolete.
     
  12. Martin_C

    Martin_C Registered Member

    Joined:
    Dec 4, 2014
    Posts:
    525
    Yes.
    Easy mitigation (and a great general mitigation against a 1001 other unpleasant experiences) are to use SUA, as @FleischmannTV mentioned in post #1659
    (I should probably say that this is a great solution to users that don't mind using SUA. Users that really don't want to, will of course do something else :))
     
  13. 4Shizzle

    4Shizzle Registered Member

    Joined:
    May 27, 2015
    Posts:
    179
    Location:
    Europe
  14. EASTER

    EASTER Registered Member

    Joined:
    Jul 28, 2007
    Posts:
    11,126
    Location:
    U.S.A. (South)
    Good read. All MS needs to do now is pull a fast one and drop out the conveyor line yet another O/S fresh off the heels of Windows 10.

    Maybe backtracking to a Windows 9? Nah, too complicated and the PR would be another firestorm for them.

    Or perhaps a Windows 11 in keeping with something like a forward order of progression?

    On Topic, Bouncer seems it is just enough to yet could be improved on as new problems surface to cover.
     
  15. co22

    co22 Registered Member

    Joined:
    Nov 22, 2011
    Posts:
    411
    Location:
    router
    ProcessHacker show *.xpi (i know its not executable and just zip) loaded under firefox
    no way to block it:doubt:
    i know there is no way in kernal for it but hope somehow manage to restrict it also.
     
  16. kakaka

    kakaka Registered Member

    Joined:
    Oct 5, 2009
    Posts:
    84
    I saw something like below in the log file.

    LSTCHECK > C:\Windows\System32\wbem\WMIADAP.exe > C:\Windows\System32\loadperf.dll

    Can anyone here teach me to write a rule to get rid of it from logging? Thanks.
     
  17. WildByDesign

    WildByDesign Registered Member

    Joined:
    Sep 24, 2013
    Posts:
    2,587
    Location:
    Toronto, Canada
    @kakaka If you want this action blocked but with silence from logging, try the following rule:

    Code:
    [PARENTBLACKLIST]
    #    Example parentblacklist block with silence rule
    $C:\Windows\System32\wbem\WMIADAP.exe>C:\Windows\System32\loadperf.dll

    Similar silent blocking rules can be done with [BLACKLIST], [PARENTBLACKLIST] and [CMDBLACKLIST] sections.
     
  18. kakaka

    kakaka Registered Member

    Joined:
    Oct 5, 2009
    Posts:
    84
    Thanks, WildByDesign. Will try that soon. And what actually does "LSTCHECK" mean in this case?
     
  19. WildByDesign

    WildByDesign Registered Member

    Joined:
    Sep 24, 2013
    Posts:
    2,587
    Location:
    Toronto, Canada
    You're welcome. Once Florian added more features to Bouncer it became more difficult to determine which type of rule triggered a specific blockage, so I suggested to add within the log which rule section triggered the blockage. So in this case LSTCHECK is referring to the parentcheck feature. If a blockage was triggered by command line rule, it would show CMDCHECK in the log.
     
  20. kakaka

    kakaka Registered Member

    Joined:
    Oct 5, 2009
    Posts:
    84
    Thanks again, @WildByDesign. I followed your instruction and worked like a charm.
     
  21. Defenestration

    Defenestration Registered Member

    Joined:
    Jul 17, 2004
    Posts:
    1,108
    I can see how CMD relates to Command in CMDCHECK, but how does LST relate to Parent in LSTCHECK (ie. what does LST mean)?
     
  22. WildByDesign

    WildByDesign Registered Member

    Joined:
    Sep 24, 2013
    Posts:
    2,587
    Location:
    Toronto, Canada
    This is something that one of us would have to specifically ask Florian. I assume that he's abbreviated the wording to a certain extent so that each is down to 3 characters to remain consistent which would also allow malware/security researchers to run custom scripts/regex against log files. But I must admit, I am curious as well to the exact meaning to LST. If someone reaches out to Florian and finds out, please do let us know.
     
  23. kakaka

    kakaka Registered Member

    Joined:
    Oct 5, 2009
    Posts:
    84
    LST == LIST
    LSTCHECK == ParentListCheck
     
  24. guest

    guest Guest

    The website of Excubits is using Cloudflare, but they were not affected from the "Cloudflare-bug"
     
  25. WildByDesign

    WildByDesign Registered Member

    Joined:
    Sep 24, 2013
    Posts:
    2,587
    Location:
    Toronto, Canada
    I've been paying attention more lately to some of these fileless attacks which often use Microsoft signed built-in binaries to bypass application whitelisting and therefore also playing around with command line scanner functionality which helps to mitigate these attacks.

    For testing, I have been using Casey Smith (@subTee) "AllTheThings" application whitelisting bypass tool: https://github.com/subTee/AllTheThings


    For Bouncer's [CMDCHECK] scanning:
    Code:
    [CMDBLACKLIST]
    #    [AllTheThings]
    *>*C:\Windows\Microsoft.NET\Framework*\*\InstallUtil.exe*/U*.dll*
    *>*C:\Windows\Microsoft.NET\Framework*\*\regsvcs.exe*.dll*
    *>*C:\Windows\Microsoft.NET\Framework*\*\regasm.exe*/U*.dll*
    *>*regsvr32*/s*.dll*
    *>*rundll32*.dll,EntryPoint*

    For those using Florian's other driver cmdScanner (aka CommandlineScanner), that code above would simply go into the [BLACKLIST] section. I have tested those command line blacklist rules quite thoroughly by disabling the rest of Bouncer's protection mechanisms so that nothing else interfered and I ensured that blockages in the log file showed up triggered by [CMDCHECK] specifically.


    So those rules above are thoroughly tested. The rules below, however, are not quite as thoroughly tested. The rules below are based on application bypass techniques listed at (https://github.com/iadgov/Secure-Host-Baseline/tree/master/EMET).

    Code:
    [CMDBLACKLIST]
    #    [Event Viewer]
    *eventvwr.exe*>*
    *>*eventvwr.exe*
    #    [PowerShell]
    *System.Management.Automation.dll*>*
    *>*System.Management.Automation.dll*
    #    [Blocking the regsvr32 application whitelisting bypass technique]
    *cmd.exe*>*regsvr32*scrobj.dll*
    *cmd.exe*>*regsvr32*scrrun.dll*
    #    [Blocking one rundll32 application whitelisting bypass technique]
    *rundll32*>*mshtml.dll*
    #    [Blocking rundll32 from loading PowerShell]
    *rundll32*>*System.Management.Automation.dll*
    #    [Blocking malicious OLE packages in Microsoft Office products]
    *\OFFICE1*\*>*flash*.ocx*
    *\OFFICE1*\*>*packager.dll*

    At the moment, what I am doing is allowing all command line functionality with *>* in the [CMDWHITELIST] section and targeting specific command lines in the [CMDBLACKLIST] section. Somewhat of a Default Allow setup, I suppose. But for the most part I am exploring and trying to learn more regarding command line scanning for my own testing purposes and thought that I would share my results so far.
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.