Toolwiz Time Freeze

Discussion in 'sandboxing & virtualization' started by sg09, Dec 1, 2011.

  1. aladdin

    aladdin Registered Member

    Joined:
    Jan 9, 2006
    Posts:
    2,986
    Location:
    Oman
    Rollback Rx cannot protect from any malware and/or viruses, whether these malware and/or viruses are sophisticated or non sophisticated.

    Best regards,

    KOR!

    P.S. Rollback Rx has neither an anti-virus nor a malware engine!
     
  2. Scoobs72

    Scoobs72 Registered Member

    Joined:
    Jul 16, 2007
    Posts:
    1,113
    Location:
    Sofa (left side)
    If you are suggesting that you cannot rollback a system when you get hit by any type of malware, regardless of its sophistication then that is utterly untrue. Where rolling back to a previous snapshot may not work is with malware that modifies the MBR or performs low level disk access.
     
  3. aladdin

    aladdin Registered Member

    Joined:
    Jan 9, 2006
    Posts:
    2,986
    Location:
    Oman
    By the time you discover the virus or malware whether it is sophisticated or non sophisticated, you might not have a clean snapshot to rollback to.

    Even programs like Acronis True Image or Acronis Disk Director, if they are uninstalled with let say Total Uninstall, can break Rollback Rx.

    Has happen to me before!

    Best regards,

    KOR!
     
  4. Scoobs72

    Scoobs72 Registered Member

    Joined:
    Jul 16, 2007
    Posts:
    1,113
    Location:
    Sofa (left side)
    Glad you agree with me then. Rollback RX could recover your system as long as:
    1. You still have a clean snapshot
    2. The malware was not of the MBR-modifying or direct disk access type

    I would never uninstall programs such as those with Total Uninstall - you're just asking for trouble. Don't blame Rollback RX for that.

    Bottom-line - Rollback RX is not a solution designed to protect you from malware, but depending on the type of infection you have, you have a reasonable chance of being able to recover a previous snapshot.
     
  5. aladdin

    aladdin Registered Member

    Joined:
    Jan 9, 2006
    Posts:
    2,986
    Location:
    Oman
    Rollback Rx is super duper "System Restore", like "System Restore" Rollback and its "Snapshots" are useless if the "Restore Points" contain viruses and/or malware.

    Why?

    Does Rollback Rx advises as such to their regular users about uninstalling programs as I mentioned with Total Uninstall?

    Can you provide some kind of links on this from HDS?

    Best regards,

    KOR!
     
  6. CyberMan969

    CyberMan969 Registered Member

    Joined:
    Apr 21, 2011
    Posts:
    589
    Guys, when I said "unsophisticated malware" I meant malware that do not modify the MBR and that are not aware of the existence of LV or of RX and its snapshots. There are a lot of crude malware out there which wouldn't have a clue that the system they have infected contains snapshots. Infections by such malware on RX or CTM systems can be easily undone just by restoring an older snapshot, for as long as the malware hasn't modified the MBR. It has happened to me in the past when I was testing CTM and RX with basic malware. All it took to get rid of them was to restore an older snapshot at next reboot, and all 'dumb' malware were history.

    Of course CTM and RX cannot protect against malware. Protect is the wrong word to use when we talk about LV and snapshot apps. But such solutions can most definitely undo most 'dumb' infections. This is an absolute fact proven by empirical data, and as such it is non-debatable.

    BTW King, the CTM and RX snapshots are hidden in a much better way than the simple Windows restore points. Not even the OS is aware of their existence, so it is highly unlikely that any unsophisticated malware would ever know that there are snapshot data stored on the disk's free space.
     
    Last edited: Jun 9, 2012
  7. ichito

    ichito Registered Member

    Joined:
    Jan 14, 2011
    Posts:
    1,997
    Location:
    Poland - Cracow
    Sorry but I have a little bit another view of this...LV give us unrealistic-artifical system...it's something like fantom in which we can work and which can be of course infected. All unwanted changes exist only inside this "box"...and they can exist only as long as we want to allow this. One move...one push on the button "power off" and we still can be glad of clear healthy system.
    Of course is the protection.
     
  8. guest

    guest Guest

    after reading those 12 pages , i can say SD is still better :D
     
  9. rrrh1

    rrrh1 Registered Member

    Joined:
    Sep 10, 2007
    Posts:
    211
    Looks like it has been updated to:

    1.8.6.0

    Still no info about changes on the main page...

    rrrh1 (arch1)
     
  10. CyberMan969

    CyberMan969 Registered Member

    Joined:
    Apr 21, 2011
    Posts:
    589
    V 1.9.0.0(June 20 2012)

    •Enhanced MBR protection
    •Start the protection when driver is loaded
    •Add protection to the password file
    •Fixed the rename bug for File Locker.
    •Added one more virtulization engine to the kernel

    Still no RAM usage for the virtualization cache... How hard can it be??

    OK guys, anyone willing to throw some malware to it, see if it works?
     
  11. ichito

    ichito Registered Member

    Joined:
    Jan 14, 2011
    Posts:
    1,997
    Location:
    Poland - Cracow
    The test will be soon...I hope :)
    BTW...it was also v. 1.8.7 beta...quote from forum TTF
    http://forums.toolwiz.com/topic/toolwiz-timefreeze-187-beta-is-released
     
  12. ichito

    ichito Registered Member

    Joined:
    Jan 14, 2011
    Posts:
    1,997
    Location:
    Poland - Cracow
    OK...test for version 1.9.0.0 is ready. Unfortunately the result is still bad for TTF in protection against TDSS. Toolwiz again should to do something with this.
    -http://www.youtube.com/watch?v=OLh9UKmP2YE-
     
  13. The Shadow

    The Shadow Registered Member

    Joined:
    Jan 24, 2012
    Posts:
    814
    Location:
    USA
    Interesting (and very sad) ....btw ichito, judging from your Wondershare Time Freeze test it doesn't do any better!

    Can any LV program successfully contain the latest TDSS variants within its virtual space (infection-free on reboot)?
     
    Last edited: Jun 23, 2012
  14. ichito

    ichito Registered Member

    Joined:
    Jan 14, 2011
    Posts:
    1,997
    Location:
    Poland - Cracow
    In the inner test of SG BufferZone passed anti-TDSS test but it was in February 2011. I don't know some other latest similar test.
     
  15. TomAZ

    TomAZ Registered Member

    Joined:
    Feb 27, 2010
    Posts:
    1,131
    Location:
    USA
    I'm not familiar with BufferZone. Is it similar in function to Sandboxie? Can you use it to test new software then get rid of it with a reboot, or isn't it that type of virtualization app?
     
    Last edited: Jun 23, 2012
  16. CyberMan969

    CyberMan969 Registered Member

    Joined:
    Apr 21, 2011
    Posts:
    589
    Anyone knows where can I can find a recent sample of TDSS or any similar rootkits? I have an older computer that I want to use as a test machine for LV software.
     
  17. ichito

    ichito Registered Member

    Joined:
    Jan 14, 2011
    Posts:
    1,997
    Location:
    Poland - Cracow
    BZ is similar to Sandboxie but has more features...it's more similar to SysWatch (old name - Safe'n'Sec). It's not LV app like Shadow Defender, Returnil, Wondershare Time Freeze or TTF.
     
  18. SLE

    SLE Registered Member

    Joined:
    Jun 30, 2011
    Posts:
    361
    From the light virtualisation programs Shadow Defender is still the only one that is successfull against TDL type rootkits.
     
  19. The Shadow

    The Shadow Registered Member

    Joined:
    Jan 24, 2012
    Posts:
    814
    Location:
    USA
    Yes, tests conducted during 2010 - 2011 pretty well proved that. I bought SD based on those tests and have been using it on both of our PCs (on-demand). But I don't know if that's still true! :doubt:


    @ ichito, do you know of any tests that disprove or update the LV-rootkit tests that were performed 2 years ago?

    TS
     
    Last edited: Jun 23, 2012
  20. SLE

    SLE Registered Member

    Joined:
    Jun 30, 2011
    Posts:
    361
    I can't speak for the actual Toolwiz (but ichito showed), but for Returnil, Wondershare etc. it is still true, I testet some weeks ago.

    Returnil moderator here often claims their product protects, but that is only true if AE blocks the sample (not always in default settings) or AV signatures exist. But from virtualisation part Returnil is not successful against TDL3/4.

    @CyberMan969: You can use every TDL3 and TDL4 sample if you wanna test, just allow execution. The behaviour is the same, real new ones aren't there.
     
  21. CyberMan969

    CyberMan969 Registered Member

    Joined:
    Apr 21, 2011
    Posts:
    589
    I couldn't find any samples to download at all. Any links? Thanks in advance!
     
  22. The Shadow

    The Shadow Registered Member

    Joined:
    Jan 24, 2012
    Posts:
    814
    Location:
    USA
    -http://contagiodump.blogspot.com/2012/02/purple-haze-bootkit.html-
     
  23. ichito

    ichito Registered Member

    Joined:
    Jan 14, 2011
    Posts:
    1,997
    Location:
    Poland - Cracow
    It's still true :) I've mentioned earlier in other places of forum about those tests but "all together now"
    Returnil
    -http://www.youtube.com/watch?v=dt3-y39FckA
    WTF
    -http://www.youtube.com/watch?v=dI-MdSIUtiY&feature=relmfu
    SD
    -http://www.youtube.com/watch?v=QFYHDMiot6U
    Now about WTF
    I dont know if I understand you correctly...in my opinion WTF passed the test - of course system was crashed but after rebooting it was healthy and clean.
     
  24. Night_Raven

    Night_Raven Registered Member

    Joined:
    Apr 2, 2006
    Posts:
    388
    According to the performed tests Toolwiz Time Freeze basically withstands TDSS. Yes, the file system is there but the rootkit itself is not so this is basically a "pass", not "fail", since the file system is harmless without the active rootkit. If I recall correctly the same thing happened during my tests of Returnil System Safe.
     
  25. Arcanez

    Arcanez Registered Member

    Joined:
    Oct 5, 2011
    Posts:
    417
    Location:
    Event Horizon
    so WTF and SD seem to have to exact same results from malwarebytes. So did WTF withstand those rootkit infections? Would have been nice if they added another hitman pro scan to see if there's any difference.
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.