The ErikAlbert Approach - A test

Discussion in 'FirstDefense-ISR Forum' started by Peter2150, Nov 27, 2007.

Thread Status:
Not open for further replies.
  1. Cerxes

    Cerxes Registered Member

    Joined:
    Sep 6, 2005
    Posts:
    581
    Location:
    Northern Europe
    How do you mean? It functions as designed in regard to its purpose to block non-whitelisted executables.

    /C.
     
  2. aigle

    aigle Registered Member

    Joined:
    Dec 14, 2005
    Posts:
    11,164
    Location:
    UK / Pakistan
    No, No its, not like this. I have proof( at least two samples). Wana try?
     
  3. Long View

    Long View Registered Member

    Joined:
    Apr 30, 2004
    Posts:
    2,295
    Location:
    Cromwell Country

    No I don't wana try but would be interested in knowing (a) if this is how most bad things work ? or is it just of minority interest ? has it actually happened ? and how are these remnants left on E: activated ?

    Essentially what I would like to know is whether this is just a jolly good idea that amuses some theoreticians or a serious everyday issue. I can live with the former.
     
  4. Long View

    Long View Registered Member

    Joined:
    Apr 30, 2004
    Posts:
    2,295
    Location:
    Cromwell Country
    Do you want to see a picture of Anna Kornikova naked ?

    well we all know that we shouldn't open attachments from strangers but it can't hurt to take a peak can it ?

    I think all security softwares fail this way eventually - unless the user is allowed no input. So there is nothing wrong with the way AE works until the user gets sloppy and allows a new program to run and even though it is pure evil AE will let it run - or perhaps I have misunderstand and AE can always tell the difference between good and bad ?
     
  5. tradetime

    tradetime Registered Member

    Joined:
    Oct 24, 2006
    Posts:
    1,000
    Location:
    UK
    Erm....no....one of the reasons, I don't get into trouble with my computers is that I leave the "trying" to the people who know what they are doing. :D
     
  6. lucas1985

    lucas1985 Retired Moderator

    Joined:
    Nov 9, 2006
    Posts:
    4,047
    Location:
    France, May 1968
    It shouldn't be difficult to code malware which reads/writes the partition tables like KillDisk does. Instead of writing garbage, you unlock/unhide the "locked" partitions.
    Couldn't agree more. That's why you need to control the data flow. This is done with access permissions, HIPS sandboxes, firewalls, etc.
    You double click the drive (default action to open a drive/folder) and the autorun.inf calls the correct executable.
    Actually, worms spreading through removable drives are a real threat.
    AE works with the default-deny concept. So, if you receive Anna Kornikova.gif.exe, AE would show a prompt saying it has denied access/execution rights to that file (a spoofed executable)
    To install something you need to open AE, enter the password and disable its protection, then rescan to whitelist all the executables created.
     
  7. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    Yes Erik, but you missed an important point, and I didn't uninstall AE for the test. I dumped it.

    I'll explain. I asked the gal that works for me how she rated her computer knowledge. She said somewhere between low, and low-medium. I told her here was program, it came from someone you very much trust, it would help you with your business, and she pretty much was sure it safe. By my gal has a slight worry. So we stepped thru the install clicking each pop up and looking at what it said. A lot was a puzzle to her until we got to a couple of registry modifications. First one disabled Taskmanager. She paused and said why would my program want to do that. Then the next registry entry locked out registry tools. While it might have been to late, it was becoming clear even to her that this was not good.

    My point about AE is I couldn't do what I just described. AE gives me no way to watch what is happening. You have to turn it off. Worse still you turn it back on and it approves what you just did. So you absolutely have to be 100 sure of what you are installing with AE.

    Is the end result the same. Maybe. I suspect in both cases the machine is infected. But one way I at least know, and take immediate action. The other way I don't, and who knows what can be done, until I restore the frozen snapshot.

    Later I plan on testing PC Security, and seeing how it holds up.
     
  8. aigle

    aigle Registered Member

    Joined:
    Dec 14, 2005
    Posts:
    11,164
    Location:
    UK / Pakistan
    I have two samples, blackday trojan n wiking worm. If I execute them from partition C, they overwrite so many exe files on D, E n F partition on my system and convert all of these exes into their copies.

    Now if u reboot and clean C partition, u will still have a lot of malware copies on D, E or F partitions. Ofcourse these copies will not execute themselves but they just need a mouse click.
     
  9. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590

    HI Longview

    What sent me down this road is I was taking a simplistic approach. I never open attachments, etc, use Sandboxie, and I only install stuff I absolutlely trust. Plus I use FDISR, and ShadowProtect, so I am fine. Then a good friend installed something, they were assured was trusted and wham.

    Made me realize that maybe my assumption about what I was trusting wasn't good. Now yes I can recover fairly easily, but that presumes I know something bad happened, and obviously better to know it right away. Made me realize maybe I shouldn't assume I can trust stuff, but watch the install and see what happens. May not catch everything, but some of the obvious bad is easy to spot. Then if infected, I can act immediately.

    So is it theortical. I would assume not. Doesn't mean we have to be totally paranoid, but we do have to understand what we are dealing with and act.

    Pete
     
  10. Long View

    Long View Registered Member

    Joined:
    Apr 30, 2004
    Posts:
    2,295
    Location:
    Cromwell Country

    Thanks the copies that will not execute themselves don't worry me that much.
    I am unlikely to click. If I did presumably C: would become contaminated again until reboot ? looks like it would help then to not have any exe on D: E .... ?
     
  11. markymoo

    markymoo Registered Member

    Joined:
    Sep 25, 2007
    Posts:
    1,212
    Location:
    England
    Stop sweating, here is secure way to prevent any access to the 2nd hard drive and to disable it and/or turn it off. Devcon will do this. You can run it again to turn it back on. You can even run it by scheduler to turn on and off at a certain time. It's dos but i show you easy way how to use it for hard drives. Here's how you do it.

    http://download.microsoft.com/download/1/1/f/11f7dd10-272d-4cd2-896f-9ce67f3e0240/devcon.exe

    unpack it to c:\devcon - goto c:\devcon\i386 folder in a cmd.exe dos box.

    goto Device Manager and note the names of your hard drives(Hardware/Disk Drives), you want to disable or remove. No long names to remember you just need to know a part of the hard drive name eg. WD800JB-0000028_USB_DEVICE is the whole name, you just have to remember a few letters of the name like in this case WD800. Now do this...

    On the command line in the folder of devcon\i386

    To Disable your drive type devcon /disable *WDC800*

    To Remove your drive type devcon /remove *WDC800*

    You can even do both then remove your drive. Its gone in a flash.

    To get the drive(s) back all you have to do is this.

    type devcon /rescan

    You can now make a batch files and 2 shortcuts on your desktop to turn on and off when you want or throw the batch file into the task scheduler to turn on/off at a certain time. A good thing to do is if you have an internal or external device for backups, is to run a batch to turn off the drive after you backed up and on again before you do. :)

    Note: *WDC800* is just an example it will be different names for your drives. You just need to note down 3-4 letters of that drive as the name for it to work.
     
    Last edited: Nov 29, 2007
  12. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    Hello All

    Gave PC Security a quick test. It failed. Installed the program, set it up, and locked my E:\ drive which is the 2nd drive on the VM machine. AFter locking it, I let the virus infect the machine. Rebooted, then shutdown the unnecessary processes. Unlocked the E:\ drive, and the infection files were there. Ergo my concusion:

    PC Security would be fine if you don't want someone to look at your "data" if they are sitting at your machine. However if you think it's protecting you from malware problems, while on line, that may be a false expectation.

    Will try Markymoo's suggestion tommorrow.

    Pete
     
  13. aigle

    aigle Registered Member

    Joined:
    Dec 14, 2005
    Posts:
    11,164
    Location:
    UK / Pakistan
    Malware samples( viruses, worms, trojans, rootkits etc) that I have used so far, all of them need a mouse click to execute either directy or via an autorun etc. Is there a malware that executes itself without any click?

    Anyone please?
     
  14. ErikAlbert

    ErikAlbert Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    9,455
    Thanks for the test and that's not good.
    Maybe we, including me, are using the wrong option : "Total Lock".

    What if we use the option : "Hide Contents and Lock"
    In that case you have to use this option for ALL folders of partition[E:]
    You can't use that option for the complete partition[E:]

    With this option,
    - you can't create new files (system.exe and autorun.inf are new files)
    - you can see the folders, but you can't open the folders.

    Check also the icon, if security is on, before you do the test. I hope it was on during the first test.


    From support (long ago), I got this remark :
    If the option "Hide contents and Lock" doesn't work, then PC Security is useless. Another security software that doesn't do its job.
     
    Last edited: Nov 29, 2007
  15. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590

    Will play some more tonight.

    Pete
     
  16. starfish_001

    starfish_001 Registered Member

    Joined:
    Jan 31, 2005
    Posts:
    1,046

    As you are playing and a user of Prosecurity have you considered using the file and folder protection in that.

    I've been playing with it .... but could very quickly make the system unusable....

    Devcon seems like a nice and simple solution
     
  17. ErikAlbert

    ErikAlbert Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    9,455
    I assume you are talking about PC Security and not ProSecurity.
    PC Security only has to lock/unlock my data partition, I don't use the rest. I could have used any other similar software, but PS was the most convenient one and that part works properly since I installed it.
    If Peter's tests are negative, DevCon will probably be my second choice.
    DefenseWall can protect my data partition also, regarding untrusted applications, just like SandboxIE, but it's not convenient enough. I'm lazy and I count my mouse-clicks and actions, when I have to do something regularly.
     
  18. ErikAlbert

    ErikAlbert Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    9,455
    Thanks Peter, I'm very interested ... :cool:
     
  19. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    Hi Starfish.

    Yes I do have licenses for Prosecurity, but the later beta's which have a lot of the file protections, also have issues. Also trying to remember if the file protections, protect the whole drive.

    Pete
     
  20. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    Not sure I can test this, both disk have the same name.
     
  21. ErikAlbert

    ErikAlbert Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    9,455
    LOL. I investigated this myself and you are right, my both harddisks have the same name and I checked several ID's.
     
  22. markymoo

    markymoo Registered Member

    Joined:
    Sep 25, 2007
    Posts:
    1,212
    Location:
    England
    lol you don't make it easy hehe, no problem. even if you have the same generic hardware ids, there is unique id called the instance id for every seperate device in enum in the regiistry you can latch onto. You only have to do this once ever to get and save it in a batch file as i described.

    Goto regedit and see all your hardware instance ids, there you will see your drives listed under one key.

    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\IDE] (yes IDE of all things)

    There will be a unique string there. Even if that doesnt do it theres always Enum/Storage/Volume

    So any unique short string that you can narrow down to 3-4 letters anywhere in the string, doesn't have to be at the start, and the * in the command complete the rest of the 1 mile long string for you.

    watch your drive disappear from device manager along with the drive letter, it physically removed.

    if you remove it and you restart plug and play will find it again this maybe fine for your purposes but if you dont want it to come back on restart then use disable command.

    *i wrongly stated the command for remove i typed devcon /disable it should of been devcon /remove
    to disable devcon /disable *hard drive string*
    to remove devcon /remove *hard drive string*

    to get back drives quick whether you disabled or removed them.
    type devcon /rescan

    Heres a good example

    Under enum i have a drive string DiskWDC_WD4000YR-01PLB0_____________________01.06A01

    01.06A01 is the revision and unique. i type devcon /remove *01.06A01* and the drive is gone. :)

    more uniqueness under the drive strings is a unique subkey with unique values like friendlyname

    DiskWDC_WD4000YR-01PLB0_____________________01.06A01\4&f915a38&0&0.4.0

    In fact if you instead goto Device Manager and dbl click on a drive and then on Details you straight away see the Instance Id in a combo box this maybe easier that going down the registry path.
     
    Last edited: Nov 29, 2007
  23. lucas1985

    lucas1985 Retired Moderator

    Joined:
    Nov 9, 2006
    Posts:
    4,047
    Location:
    France, May 1968
    Drive-bys :)
    Once you have the dropper/downloaded "confined", it needs a double-click to execute.
     
  24. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    Hi Markmoo

    I have the highest regard for your technical expertise, but this to me is a non solution. One of my criteria is I want a solution, that I could help a non technical friend get going over the phone. I wouldn't even fool with this myself.

    However I do appreciate knowing there is someone with the knowledge, that I admittedly don't have, that we can call on. Stay with us.

    Pete
     
  25. starfish_001

    starfish_001 Registered Member

    Joined:
    Jan 31, 2005
    Posts:
    1,046

    No I'm talking about pro security.

    DEvcon or Defensewall are probably the easy way to do this
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.