bypass Online Armor Firewall

Discussion in 'other anti-malware software' started by a256886572008, Jul 16, 2010.

Thread Status:
Not open for further replies.
  1. kjdemuth

    kjdemuth Registered Member

    Joined:
    Jul 29, 2005
    Posts:
    2,974
    Location:
    Boston, MA
    So when you pressed block, youre saying that it didn't actually block the exe or process string?
     
  2. aigle

    aigle Registered Member

    Joined:
    Dec 14, 2005
    Posts:
    11,164
    Location:
    UK / Pakistan
  3. aigle

    aigle Registered Member

    Joined:
    Dec 14, 2005
    Posts:
    11,164
    Location:
    UK / Pakistan
    in my personal opinion, this is not relevant to the test results.
     
  4. bellgamin

    bellgamin Registered Member

    Joined:
    Aug 1, 2002
    Posts:
    8,102
    Location:
    Hawaii
    I agree. The fact is, OA seemingly needs to improve in this area. As reported by Nizarawi, OA's Alex acknowledges that possibility & intends to look into it. Now THAT is why I am an OA user and major believer.

    We should be grateful to OP for revealing this issue. Instead, the apologists are, as is all too often the case, seeking to discredit OP in order to make his findings go away.

    With friends like these, a security app doesn't need any enemies.
     
    Last edited: Jul 19, 2010
  5. a256886572008

    a256886572008 Registered Member

    Joined:
    Oct 26, 2007
    Posts:
    103
  6. MeFer

    MeFer Registered Member

    Joined:
    Dec 16, 2008
    Posts:
    89
    Thanks @a256886572008 for yr all efforts.

    Now awaiting satisficer respond from vendor for all.
     
  7. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    The OP has posted identically in the OA forums, and the developers are responding there.

    Pete
     
  8. bonedriven

    bonedriven Registered Member

    Joined:
    Jan 14, 2007
    Posts:
    566
    :thumb:
     
  9. bonedriven

    bonedriven Registered Member

    Joined:
    Jan 14, 2007
    Posts:
    566
    If I know every normal file from malware,what's the point of running HIPS?
     
  10. a256886572008

    a256886572008 Registered Member

    Joined:
    Oct 26, 2007
    Posts:
    103
    another virus which bypass OA

    1.copy the two files to usb disk

    Thumbs.lnk AutoRun.Inf

    2.double click on the disk of the usb

    3.OA popup two alert windows, choose block.

    http://i234.photobucket.com/albums/ee153/a256886572008/do/oa25.png

    http://i234.photobucket.com/albums/ee153/a256886572008/do/oa26.png

    4.the virus (rundll32.exe) inject the dll files of the virus into the processes of
    the system, but OA does not block these behaviors.

    5.there are virus and autorun.inf in every disk.

    6.the virus files become hidden.
     
  11. subset

    subset Registered Member

    Joined:
    Nov 17, 2007
    Posts:
    825
    Location:
    Austria
    Only Matousec has a permission to test OA's HIPS capabilities.
    Do not test it with real malware - that's improper and rude.

    Cheers
     
  12. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    Why don't you try testing using the run safer option.

    Pete
     
  13. a256886572008

    a256886572008 Registered Member

    Joined:
    Oct 26, 2007
    Posts:
    103
    There is not a check box, "run safer", in the alert window.

    :gack:
     
  14. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    Right. Not positive, about free versions, but in the paid version, you can right click the exe file, and choose open safer.

    Pete
     
  15. Page42

    Page42 Registered Member

    Joined:
    Jun 18, 2007
    Posts:
    6,941
    Location:
    USA
    Yes, that's how it is in the free version as well. :)
     
  16. ace55

    ace55 Registered Member

    Joined:
    Mar 29, 2010
    Posts:
    91
    If I am not mistaken and run safer only runs the executable as a limited user, this will do nothing to prevent dll injection into explorer.
     
  17. bellgamin

    bellgamin Registered Member

    Joined:
    Aug 1, 2002
    Posts:
    8,102
    Location:
    Hawaii
    It's a preposterous comment. Permission is not needed in order to test software. Use of real malware is a valid way to test a security app.

    Per Peter, the developers are are responding to this issue. If it's a valid glitch, then it's good that it was discovered. If it isn't valid, then that fact will shortly be determined as well.

    Regardless of motives, OP has rendered a service.
     
  18. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    Run Safer is like a limited user, it should impact anything the exe does.

    Pete
     
  19. subset

    subset Registered Member

    Joined:
    Nov 17, 2007
    Posts:
    825
    Location:
    Austria
    Hit by a serious sense of humour failure? :rolleyes:
     
  20. a256886572008

    a256886572008 Registered Member

    Joined:
    Oct 26, 2007
    Posts:
    103
    This ia a dll file, not a exe file.

    So, you can not execute the virus with "run safer"
     
  21. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    Okay, but something had to execute to put the dll there.
     
  22. a256886572008

    a256886572008 Registered Member

    Joined:
    Oct 26, 2007
    Posts:
    103
    1.When you double click on the infected usb disk, explorer.exe executes rundll32.exe with command line.

    But OA does not popup an alert window.

    2.rundll32.exe injects some dll files into the processes of the system.
    OA does not popup an alert window.

    3.rundll32.exe installs driver ressdt.sys
    rundll32.exe installs browser helper object.

    OA only popup the two alert windows.
     
    Last edited: Jul 21, 2010
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.