ZeroVulnerabilityLabs ExploitShield

Discussion in 'other anti-malware software' started by sbwhiteman, Sep 28, 2012.

Thread Status:
Not open for further replies.
  1. guest

    guest Guest

    Thanks @vojta


    @ZeroVulnLabs
    Have you take a look to this report?
    -https://secunia.com/?action=fetch&filename=secunia_yearly_report_2011.pdf-
    You can find there the most used software and if they are "exploitable" or not

    I have seen that some or them are missing like
    1 ms Microsoft XML Core Services (MSXML) 100% 1 0 Yes
    3 ms Microsoft .NET Framework 99% 5 10 Yes
    21 tp Adobe AIR 52% 38 28 Yes
    ...

    Do you plan to include those in a future?
     
    Last edited by a moderator: Dec 6, 2012
  2. vojta

    vojta Registered Member

    Good news, Trusteer has just notified me that they will white-list ExploitShield's processes.
     
  3. guest

    guest Guest

    Thanks for the update :)
     
  4. ZeroVulnLabs

    ZeroVulnLabs Developer (aka "pbust")

    Thanks for everything votja!!
     
  5. popcorn

    popcorn Registered Member

  6. guest

    guest Guest

  7. popcorn

    popcorn Registered Member

  8. starfish_001

    starfish_001 Registered Member

  9. Notok

    Notok Registered Member

    I just found that Webroot SecureAnywhere is blocking exploitshield64.dll from being injected into Firefox (looking in ProcessExplorer). However, ExploitShield still shows 1 program protected.

    I tried setting the ES program files and the DLLs to Allowed in WSA, but that doesn't seem to help.

    When WSA is shut down, Firefox does load the DLL.

    I just opened a support ticket with Webroot. Strange that ES would still report the protected program.

    It would probably be worth adding something in the browser UI to indicate that ES is protecting that app.
     
    Last edited: Dec 7, 2012
  10. ZeroVulnLabs

    ZeroVulnLabs Developer (aka "pbust")

    Thanks!!

    Please keep us up-to-date here on what response you get from them.
     
  11. Victek

    Victek Registered Member

    Agreed. ES is virtually invisible unless it gets called into action, especially if the tray icon disappears, which unfortunately is a problem on my 64 bit system (not just with ES). It would be great to have a browser plugin that showed status.
     
  12. Bodhitree

    Bodhitree Registered Member

    Note: ES is not compatible with Webroot Secureanywhere. The injection shows it worked, ES reports it working, but it actually isn't working. I believe someone else in this thread noted this.

    It does this for Chromium as well as Firefox. ES might want to get a hold of WR to report this issue.
     
  13. sevenstar

    sevenstar Registered Member

    The ExploitShield.dll does show up when the Firefox plugin container is running. ExploitShield does not show in Process Explorer when the plugin container is not running and WSA is running.
    Allen
     
  14. vojta

    vojta Registered Member

    I reckon that it should show two shielded processes when working normally: One for Firefox and one for the plugin container. WSA must be protecting firefox.exe but not plugin-container.exe
     
  15. vojta

    vojta Registered Member

    It disappears too on XP SP3 while in a limited user account. As a workaround, I have a shortcut to the log "exploitshield" inside the installation folder. This way I can check what's happening from time to time.
     
  16. m00nbl00d

    m00nbl00d Registered Member

    I was wondering about what happens to the executables/payload that ExploitShield stops? I know there's a Files quarantined in the GUI, but does it really quarantine them, or by that it's meant that it blocks and deletes them?
     
  17. ZeroVulnLabs

    ZeroVulnLabs Developer (aka "pbust")

    The ones it can physically quarantine are sent to %ProgramFiles%\ZeroVulnerabilityLabs\ExploitShield\Quarantine directory with modified names and extensions to make them harmless. If they are new, never seen before payload based on MD5, they are also uploaded to the real-time information feed:
    http://www.zerovulnerabilitylabs.com/home/services/security-intelligence/

    There are however some exploit payloads which cannot be physically be moved as they are either memory-only attacks or some other techniques.
     
  18. ZeroVulnLabs

    ZeroVulnLabs Developer (aka "pbust")

    Sorry guest just realized I forgot to respond to your question.

    The way ExploitShield works, any vulnerable library which is loaded within the browser (IE, FF, Chrome, etc.) is protected by ExploitShield. It does not matter if its Flash, Shockwave, Java, MSXML, Adobe plugin or whatever. In fact when the MSXML IE vuln came out (CVE-2012-1889) we made a video of a 2-month old ExploitShield prototype against the newly discovered vuln exploit to show how ExploitShield can protect against zero-days, without relying on signatures or white-listing:
    http://www.youtube.com/watch?v=VYlS8fgsBXs

    As another example of ES vs zero-days, here's another video of a 5-month old ExploitShield prototype against CVE-2012-1875 (IE zero-day) on the day the exploit was made public:
    http://www.youtube.com/watch?v=uKZgDcOL_Ic
     
  19. m00nbl00d

    m00nbl00d Registered Member

    OK. Thanks the clarification. :thumb:

    -edit-

    Regarding the payloads MD5, in addition to being sent to the information feed, will they (the MD5s) also be added to ES logs?
     
    Last edited: Dec 10, 2012
  20. Notok

    Notok Registered Member

    After taking a look at my system remotely, they found that they could reproduce it in-house, and so they're working on it now.

    In the meantime you (we) can choose to disable WSA's protection for Firefox by setting the browser to Allow in the list of Protected Applications under Identity Shield. So it's just a question of which you'd rather have protecting the browser until they get a fix.
     
  21. ZeroVulnLabs

    ZeroVulnLabs Developer (aka "pbust")

    No, the MD5 are not shown on the logs in order to not confuse non-technical users. Technical users can get the files themselves from the disk and process them any way they want (send to VT, get a checksum, etc.).

    Thanks for all your help Notok!!
     
  22. Skiaz

    Skiaz Registered Member

    I've also experienced the Windows Media Player problem which starts when ExploitShield is installed and goes back to normal operation once ExploitShield is removed from the system.

    I have 2 systems, both Win7 x64 Ultimate. One does not exhibit the problem while the other does.

    On the system with the WMP issue, I noticed strange things happening with the view of my music in WMP. All the music disappeared even though it still existed on the disk. Things went downhill from there to where the app would crash when I attempted to open WMP. I would get this error in the Event Log every time:

    Faulting application name: wmplayer.exe, version: 12.0.7601.17514, time stamp: 0x4ce7a485
    Faulting module name: SHLWAPI.dll, version: 6.1.7601.17514, time stamp: 0x4ce7b9e2
    Exception code: 0xc0000005
    Fault offset: 0x00013898
    Faulting process id: 0x1b54
    Faulting application start time: 0x01cdd276eb4e4840
    Faulting application path: C:\Program Files (x86)\Windows Media Player\wmplayer.exe
    Faulting module path: C:\Windows\syswow64\SHLWAPI.dll
    Report Id: 2a565c08-3e6a-11e2-ac0b-005056c00008

    Any ideas as to what could be going on? I am willing to experiment with this if that would help.

    Thanks.
     
  23. ZeroVulnLabs

    ZeroVulnLabs Developer (aka "pbust")

    Thanks gor testing Skiaz!

    We think this might be due to some incompatibility with other software, probably security software. Could you PM or email me a DDS log to support at zerovulnerabilitylabs dot com?
    http://download.bleepingcomputer.com/sUBs/dds.scr
     
  24. Skiaz

    Skiaz Registered Member

    DDS log sent via email.
     
  25. ZeroVulnLabs

    ZeroVulnLabs Developer (aka "pbust")

    Did not receive them. Can you please re-send and double-check the email address?
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice