if you run kis and are having browsing issues ..

Discussion in 'other anti-virus software' started by zfactor, Feb 12, 2008.

Thread Status:
Not open for further replies.
  1. Xenophobe

    Xenophobe Registered Member

    Joined:
    May 26, 2007
    Posts:
    174
    It's only in Kaspersky Internet Security I believe.
     
  2. ejames82

    ejames82 Registered Member

    Joined:
    Mar 23, 2007
    Posts:
    156
    xenophobe,
    i guess that explains why i couldn't find it. i was going nuts.
    thanks for the reply, Ed
     
  3. Zombini

    Zombini Registered Member

    Joined:
    Jul 11, 2006
    Posts:
    469
    Just did. Extracted the contained html and double-clicked it after installing the vulnerable version of Qvod version 2.1.5. It was detected and blocked. See attachment.:D No surprise.

    What next.
     

    Attached Files:

  4. Sjoeii

    Sjoeii Registered Member

    Joined:
    Aug 26, 2006
    Posts:
    1,240
    Location:
    52?18'51.59"N + 4?56'32.13"O
    Correct
     
  5. Zombini

    Zombini Registered Member

    Joined:
    Jul 11, 2006
    Posts:
    469

    All default outofthebox settings. Its not surprising Sjoeii. KIS is not detecting the underlying vulnerability. Its still detecting the payload that the vulnerability drops e.g. researching the protection, it looks like it triggers on the shell-code + on the name of the activex + on the literal string of the method of the activeX. Change or obfuscate any of these and the attack gets through.
     
  6. Sjoeii

    Sjoeii Registered Member

    Joined:
    Aug 26, 2006
    Posts:
    1,240
    Location:
    52?18'51.59"N + 4?56'32.13"O
    Good thing is that it still has room for improvements :p ;)
     
  7. solcroft

    solcroft Registered Member

    Joined:
    Jun 1, 2006
    Posts:
    1,639
    Probably because I submitted the undetected files to all vendors that didn't catch them, and I notice your reply came two days late. :rolleyes:

    Nice try anyway.
     
  8. Zombini

    Zombini Registered Member

    Joined:
    Jul 11, 2006
    Posts:
    469
    That signature was released on Jan 22, here is the link http://www.symantec.com/avcenter/security/Content/2008.01.22c.html. And it hasn't been updated since as indicated by the release notes. Small detail that you ignored, but thats expected from all Symantec bashers. This constant and unfounded bashing of ALL Norton features even those that actually work well is getting old real fast. Please get your facts straight before posting rubbish, cause you can bet someone will call you on it.

    There is no way you will believe that Norton has better drive-by protection is there. I am wasting my time. Good Luck.
     
    Last edited: Feb 18, 2008
  9. solcroft

    solcroft Registered Member

    Joined:
    Jun 1, 2006
    Posts:
    1,639
    Just out of curiosity, did the others get stopped by Symantec as well?

    Apparently Symantec seems to have some detection mechanism that isn't included at VT. I'll dredge up a copy of Symantec on a test machine later.

    Of course you are. Idle, unsubstantiated claims and anecdotal evidence don't really count for much. At any rate I'm re-downloading a trial copy of NIS2008 right now - will keep you updated.
     
  10. lucas1985

    lucas1985 Retired Moderator

    Joined:
    Nov 9, 2006
    Posts:
    4,047
    Location:
    France, May 1968
    I think Zombini says that the drive-by protection of Norton is included in the IDS signatures of the firewall, which obviously aren't available at VT. Or it could be something related to SONAR.
     
  11. solcroft

    solcroft Registered Member

    Joined:
    Jun 1, 2006
    Posts:
    1,639
    Both sound highly improbable. Firewall IDS typically do not defend against script exploits, as it just isn't their jurisdiction, and behavioral based detection can hardly assign specific names to exploit files.

    But I guess we'll see over the next day or two as I toy with it.
     
  12. lucas1985

    lucas1985 Retired Moderator

    Joined:
    Nov 9, 2006
    Posts:
    4,047
    Location:
    France, May 1968
    That's what I think, but everytime someone talks about drive-by protection in NAV/NIS points to the IDS :doubt:
     
  13. Zombini

    Zombini Registered Member

    Joined:
    Jul 11, 2006
    Posts:
    469
    NIS/NAV 2008 added a new feature called Browser Defender, that was specifically designed to detect obfuscated drive-by downloads, script-based or non script-based. I have attached a screenshot. It shows up under the IPS settings, so it may or may not be part of the IPS, I have no way of knowing. NIS/NAV 2007 does not have this feature, neither does N360 v1

    This feature is NOT used by the Norton scanner on VT or Jotti or av-comparatives because it is only invoked if you attempt to browse to the malicious URL or double-click the htm when its on the disk. Just right-clicking and selecting "scan with Norton" will not trigger a detection. Neither will a command line scanner that VT uses.

    Solcroft,

    Make sure you have the system setup correctly when testing NIS's drive-by protection:
    - the system must be unpatched for the vulnerability being tested. If it is patched, the patch may have set the kill-bit and hence the activex will not load and hence you wont get a detect
    - If you are testing an exploit on a non-Microsoft activeX, make sure the activex is installed. If it isn't then it can't be instantiated, hence Norton wont detect it.
    - Finally make sure you either browse to the URL containing the exploit, or double-click the local html.

    Good Luck.
     

    Attached Files:

  14. lodore

    lodore Registered Member

    Joined:
    Jun 22, 2006
    Posts:
    9,065
    it is turned on by default?
    lodore
     
  15. Zombini

    Zombini Registered Member

    Joined:
    Jul 11, 2006
    Posts:
    469
    Yes.

    Zombini
     
  16. solcroft

    solcroft Registered Member

    Joined:
    Jun 1, 2006
    Posts:
    1,639
    Question: I've downloaded NAV2008. Do I get the Browser Defender thingy in that, or do I need to go back and redownload the suite instead?
     
  17. lucas1985

    lucas1985 Retired Moderator

    Joined:
    Nov 9, 2006
    Posts:
    4,047
    Location:
    France, May 1968
    Thanks. I still wonder how it sees the exploit signature in an ocean of obfuscated script without a full scripting engine.
    IIRC, it's also available in the AV.
     
  18. zfactor

    zfactor Registered Member

    Joined:
    Mar 10, 2005
    Posts:
    6,102
    Location:
    on my zx10-r
    hmm this does seem a issue with kis, i do see what you mean now that i have played with this...arghh just when you think you have found the right one....
     
    Last edited: Feb 18, 2008
  19. Zombini

    Zombini Registered Member

    Joined:
    Jul 11, 2006
    Posts:
    469
    Good question. I dont know the answer, but whatever Norton is doing it works great.
     
  20. zfactor

    zfactor Registered Member

    Joined:
    Mar 10, 2005
    Posts:
    6,102
    Location:
    on my zx10-r
    i actually really like nis2008 it just still impacts my system much more than even kis does.. and as i stated above i am def not a norton fan.. it is a great overall av.. i wish they could bring system impact down even a bit more and honeslty id prob use it myself..
     
  21. Bunkhouse Buck

    Bunkhouse Buck Registered Member

    Joined:
    May 29, 2007
    Posts:
    1,286
    Location:
    Las Vegas
    It works great indeed.
     
  22. ronjor

    ronjor Global Moderator

    Joined:
    Jul 21, 2003
    Posts:
    164,045
    Location:
    Texas
    As this thread seems to have morphed into a comparison thread, it will now be closed.
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.