Hacking DefenseWall, GeSWall etc in 60 seconds

Discussion in 'other anti-malware software' started by ssj100, Aug 18, 2009.

Thread Status:
Not open for further replies.
  1. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    You've just made Matt's case. If a user can't configure other products how would he ever be able to decide against allow or block. Matts right most would chose allow.
     
  2. aigle

    aigle Registered Member

    Joined:
    Dec 14, 2005
    Posts:
    11,164
    Location:
    UK / Pakistan
    Can you share the keylogger via PM. I have not seen the videos. I am assuming that it was the one used to wrongly test the products.

    Let us test it in the correct way. :D
     
  3. jmonge

    jmonge Registered Member

    Joined:
    Mar 20, 2008
    Posts:
    13,744
    Location:
    Canada
    hi is bluepointsecurity a behabiuor blocker?
     
  4. BluePointSecurity

    BluePointSecurity Registered Member

    Joined:
    Aug 1, 2009
    Posts:
    134
    As I have stated before, Matt's review wasn't really a review at all. It appears that Matt posted his review to retaliate rather than actually review the product. He has reviewed other AE style apps with glowing reviews (with far less features, no av and flawed security models). It was obvious from our point of view he didn't have an understanding of how the product even worked.

    As far as the keylogger videos I'm quite surprised at the reactions. I can actually understand why people questioned the GesWall and DefenseWall tests. What about the rest of them? However, please keep in mind the entire point of the tests was not to see if these products could be tweaked and modified into preventing it. The test was performed to prove that most of these products fail to actually prevent newly created (we created it) threats with out of the box settings. Threats don't play by rules such as network drives and servers should be trusted as was demonstrated. I've seen many many organizations infected via their network drives and a security product should be capable of protecting from things like that out of the box imho. Everyone is quite focused on these two products with no real mention of the rest of the AV products. 90% of the general public is running them. Everyone one of them failed to the execution and the outbound network traffic. This is a serious problem.

    It's unfortunate many think these tests were "attacking", unfair or that we purposely set them up to fail as we certainly didn't. I've been a programmer for over 10 years, which puts me in the position of actually being able to create threats and truly test these products. I would really like to run the top 10 products through more real world tests with newly created threats but it seems they would be attacked any way you look at it.

    The keylogger was less than 30 lines of code and took about 30 minutes to create, very simple. The fact that I can sit down and compile up a threat and it not be detected by 95% of the products out there has always bothered me. That was the reason for the videos and the reason for our product. Anyone with basic programming skills could easily confirm this fact.

    Just my 2 cents
     
  5. BluePointSecurity

    BluePointSecurity Registered Member

    Joined:
    Aug 1, 2009
    Posts:
    134
    "1. Never run a file (no matter what the file type) from an unknown/untrusted source on your real system, until you've verified it to be safe."

    I absolutely agree, that's the point behind BluePoint. You can't do that with any of the mainstream market leading products.
     
  6. BluePointSecurity

    BluePointSecurity Registered Member

    Joined:
    Aug 1, 2009
    Posts:
    134
    "Matts right most would chose allow."

    That's why our product isn't for everyone. Keep in mind, you won't be given the allow/deny if you attempt to execute an in the wild threat. These are the same users that would setup GesWall and DefenseWall incorrectly and end up unprotected. I have a feeling there are many on this forum that are very capable of using our product effectively. In my opinion GesWall and DefenseWall are quite a bit more complicated to operate than our product. Our product isn't necessarily for everyone although it's not out of the realm of many average users.
     
  7. trjam

    trjam Registered Member

    Joined:
    Aug 18, 2006
    Posts:
    9,102
    Location:
    North Carolina USA
    how the hell do you setup Geswall and Defensewall incorrectly. They are setup right out of the box. Even a idiot likes me knows how to use them. Are you even familiar with the products you "talk" about.
     
  8. Franklin

    Franklin Registered Member

    Joined:
    May 12, 2005
    Posts:
    2,517
    Location:
    West Aussie
    Here I run unknown/untrusted source files all the time on the real system and harvest any droppers utilising Sandboxie.

    Possible to do with your app?
     
  9. BluePointSecurity

    BluePointSecurity Registered Member

    Joined:
    Aug 1, 2009
    Posts:
    134
    Trjam:

    Trusting network servers and drives out of the box is what I consider setup incorrectly.

    Keep in mind, I am primarily here to answer any questions you may have about our product.
     
  10. trjam

    trjam Registered Member

    Joined:
    Aug 18, 2006
    Posts:
    9,102
    Location:
    North Carolina USA
    "Matts right most would chose allow."

    You said this.

    "Trusting network servers and drives out of the box is what I consider setup incorrectly."

    You said this.

    Am I missing something here.
     
  11. BluePointSecurity

    BluePointSecurity Registered Member

    Joined:
    Aug 1, 2009
    Posts:
    134
    One of the products we tested trusts network/remote drives by default as mentioned earlier in this thread. This setting can easily be changed however (if the user realizes this is an issue). I hope we can stick to mostly QA. I am not here to put down any other vendors product, only to help out where I can.

    Mods should I create a new thread for QA at this point?
     
  12. Dregg Heda

    Dregg Heda Registered Member

    Joined:
    Dec 13, 2008
    Posts:
    830
    Is your product an anti-executable? Does it recognise all binary executable types? What about script executables?
     
  13. Franklin

    Franklin Registered Member

    Joined:
    May 12, 2005
    Posts:
    2,517
    Location:
    West Aussie
    Installed BluePoint into an XP VM where I received a prompt on Sandboxie's start.exe which I allowed.

    Installed the newish rogue BlockDefense which I allowed at BluePoint's prompt then did a full scan with BluePoint.

    SB.jpg

    BP.jpg
     
  14. BluePointSecurity

    BluePointSecurity Registered Member

    Joined:
    Aug 1, 2009
    Posts:
    134
    Yes, BluePoint is technically an anti-executable type of security product. We do protect against all binarys including but not limited to .scr (screen savers), .vbs (vbscripts) and .bat (batch) files. BluePoint does properly handle .vbs files individually rather than simply blocking the scripting host.

    Thanks!
     
  15. jmonge

    jmonge Registered Member

    Joined:
    Mar 20, 2008
    Posts:
    13,744
    Location:
    Canada
    this one can be easilly deteted by appranger:D
     
  16. BluePointSecurity

    BluePointSecurity Registered Member

    Joined:
    Aug 1, 2009
    Posts:
    134
    Looks like BlockDefense isn't included in our database. I'll see what we can do about adding it. It's pretty tough keeping up with all of the rogues out there, I'm glad to hear it did atleast ask for permission to install first!
     
  17. BluePointSecurity

    BluePointSecurity Registered Member

    Joined:
    Aug 1, 2009
    Posts:
    134
    This is actually a good example of the rapid release rate of malware and rogues and one of the reasons why we don't rely on heuristics or signatures to prevent these type of apps. You would have to actually give things like this permission to install in the first place, granted the average clueless user may not know how to handle that but the product isn't really designed for them :)
     
  18. jmonge

    jmonge Registered Member

    Joined:
    Mar 20, 2008
    Posts:
    13,744
    Location:
    Canada
    this is really true,cause of the name one can easilly guez is bad ''unknown to my eyes'':)
     
  19. Franklin

    Franklin Registered Member

    Joined:
    May 12, 2005
    Posts:
    2,517
    Location:
    West Aussie
    You have no argument from me on that point!
     
  20. jmonge

    jmonge Registered Member

    Joined:
    Mar 20, 2008
    Posts:
    13,744
    Location:
    Canada
    he says he will add it to the bluepoint security database;)
     
  21. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    Well I ran it against 3 older variants of stuff such as Killdisk. At first I put OA++ and MD in learning mode.

    Ran Killdisk, no warnings, alerts whatsoever, and it took the VM down.

    Then I reran along with 2 other older virus. Let MD and OA++ run.

    Had all kinds of alerts out of MD, about various things the malware was doing.

    OA++ also did a lot of alerting, and it picked up every file run as infected.

    Not a peep out of blue point except for one alert about the trial subscription.

    Install seemed to go okay, it scanned the system, and then I did an update.

    o_O??

    Pete
     
  22. BluePointSecurity

    BluePointSecurity Registered Member

    Joined:
    Aug 1, 2009
    Posts:
    134
    Interesting,

    If your aren't receiving any alerts I'm guessing either something may be conflicting (the other security apps?) or protection isn't enabled for some reason. Would you mind checking the status page to see if it states secure? If any executable runs without prompting you something is probably not right with it. Check to make sure the service is running also.
     
  23. BluePointSecurity

    BluePointSecurity Registered Member

    Joined:
    Aug 1, 2009
    Posts:
    134
  24. Dregg Heda

    Dregg Heda Registered Member

    Joined:
    Dec 13, 2008
    Posts:
    830
    Can you give me a run down of all the script executables you protect against? Thanks!

    EDIT: Can your product be configured to Default Deny only allowing executables on a whitelist?
     
  25. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    When I first installed it the status page said insecure. I turned it on and then it said secure.

    Only strange thing I noticed, is after I updated, the status page showed it had been updating, but the update tab, would show update in progress, and then close that page.

    I'll take another look and check on the service.
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.