What non-signature-based malware detection programs and techniques do you use?

Discussion in 'other anti-malware software' started by MrBrian, Jan 5, 2015.

  1. ArchiveX

    ArchiveX Registered Member

    Joined:
    Apr 7, 2014
    Posts:
    1,501
    Location:
    .
    Humans need courage to admit their mistakes...:thumb:
     
    Last edited: Jan 9, 2015
  2. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
    I just tried the the latest Norton Power Eraser's Reputation Scan on the whole system partition of a virtual machine, and it worked fine :thumbd:. The difference between this and a typical signature-based scan is that Reputation Scan seems to classify files as good, bad, or unknown, instead of just bad or not bad.
     
  3. jmonge

    jmonge Registered Member

    Joined:
    Mar 20, 2008
    Posts:
    13,744
    Location:
    Canada
    webroot antivirus :) and hitmanpro
     
  4. 142395

    142395 Guest

  5. 142395

    142395 Guest

  6. @142395
    I have a friend who is an malware reverse engineer and used to work for a Dutch bank corporation. (we were colleagues 30 years ago when we implemented one of the first real time banking applications in the Netherlands, there were no frameworks, everything had to be developed from scratch). He now works in HongHong, so I do not have access to fresh malware of his honey-pot anymore. We mail each other from time to time. When I ask him questions, he sometimes answers with cheek in tongue replies (when the question triggers an answer which is over my head). I decided to post his result, for the people with deeper knowledge on security. For fun I will reply him with your post #56 :D
     
  7. 142395

    142395 Guest

    Looking forward to it, but I'm not malware expert so I'm sure the result will be over my head too!:D
    Tools/services I mentioned in #56 can be used even w/out advanced knowledge (of course I can't draw full potential from them as I don't have such deeper knowledge), only Anubis and Malwr requires at least some experience of playing with malware.
    Anyway, that will be great benefit as long as at least one person can interpret and explain it!
     
  8. Behold Eck

    Behold Eck Registered Member

    Joined:
    Aug 23, 2013
    Posts:
    574
    Location:
    The Outer Limits
    Spyware Terminator,Privatefirewall,Sandboxie,HMP and Process Explorer.

    Regards Eck:)
     
  9. siketa

    siketa Registered Member

    Joined:
    Oct 25, 2012
    Posts:
    2,718
    Location:
    Gaia
    :eek::eek::eek:
    I thought this one was abandoned...hadn't seen any program updates since v2012.
     
  10. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
    I forgot to mention Copernicus (for BIOS firmware changes).
     
    Last edited: Jan 15, 2015
  11. Behold Eck

    Behold Eck Registered Member

    Joined:
    Aug 23, 2013
    Posts:
    574
    Location:
    The Outer Limits
    Correct it appears to be abandoned but it`s the only standalone HIPS for 64 bit that I know of plus HIPS don`t need updated.

    Regards Eck:)
     
  12. CloneRanger

    CloneRanger Registered Member

    Joined:
    Jan 4, 2006
    Posts:
    4,978
    MrBrian

    Don't forget ALL the ARK's, AntiRootkits ! Plus,

    ESET,s SysInspector

    tweaking.com svchost.exe lookup tool
     
  13. siketa

    siketa Registered Member

    Joined:
    Oct 25, 2012
    Posts:
    2,718
    Location:
    Gaia
    I have never seen any HIPS activity from it beside asking whether or not to run some file.
    This can be also achieved by some anti-exec application.
    Can you show me popup with any other questions?

    Did you try SpyShelter?
     
  14. Behold Eck

    Behold Eck Registered Member

    Joined:
    Aug 23, 2013
    Posts:
    574
    Location:
    The Outer Limits
    It`s a proper HIPS alright in that even if you allow a malicious process initially ST will still keep "tabs" on it giving you a chance to still block and terminate.An anti-exe gives only the one allow or block so I just like the extra options.Plus ST has a review list showing what you`ve already allowed.

    As I`m running Privaatefirewall which includes a very good BB so I think A HIPS is a perfect compliment to it.Add Sandboxie into the mix and things are tight and light.

    The questions from a popup may look similar but can be from different shields if i remember right when testing some time ago.I`ll try and show a popup when ever I get a bit more time to do it.

    Never tried Spyshelter but have heard a lot of good things about it same with Voodoo Shield.

    Regards Eck:)
     
  15. siketa

    siketa Registered Member

    Joined:
    Oct 25, 2012
    Posts:
    2,718
    Location:
    Gaia
    Isn't Process Monitor in PFW actually a HIPS, not a behavior blocker?
     
  16. Behold Eck

    Behold Eck Registered Member

    Joined:
    Aug 23, 2013
    Posts:
    574
    Location:
    The Outer Limits
  17. guest

    guest Guest

    Yeah, PFW's HIPS is somewhere between a BB and CHIPS. Although to me it is closer to a CHIPS. Outpost was too quite though, unless I misconfigured it somehow.
     
  18. Behold Eck

    Behold Eck Registered Member

    Joined:
    Aug 23, 2013
    Posts:
    574
    Location:
    The Outer Limits
    Everything quiet here for the most part with PFW and ST but I wouldn`t want it too quiet though just the odd pop-up here and there to confirm that they are still working.

    I had Outpost Pro giving me alerts to it`s own outbound connection which was a bit disappointing but it would be great to see some testing with regard to HIPS/BB`s old and new.Would make for some interesting results.

    What does the C stand for when you mention CHIPS, Graf ?

    Regards Eck:)
     
  19. siketa

    siketa Registered Member

    Joined:
    Oct 25, 2012
    Posts:
    2,718
    Location:
    Gaia
    Classic HIPS?
     
  20. FleischmannTV

    FleischmannTV Registered Member

    Joined:
    Apr 7, 2013
    Posts:
    1,093
    Location:
    Germany
  21. phalanaxus

    phalanaxus Registered Member

    Joined:
    Jan 19, 2011
    Posts:
    509
  22. Behold Eck

    Behold Eck Registered Member

    Joined:
    Aug 23, 2013
    Posts:
    574
    Location:
    The Outer Limits
    LOL......so it stands for California now I know.:D

    Those guys were an Intrusion Prevention System in their own right,I want them on my system.:cool::cool:

    Regards Eck:)
     
  23. Lagavulin16

    Lagavulin16 Registered Member

    Joined:
    Nov 26, 2014
    Posts:
    195
    Location:
    Emerald City
    @FleischmannTV all BTW, back to the ol 'avatar (nice move). Had to check it out and caught "Computer Freak" via YouTube. Made me wish to "heck" I could sing German in the shower. Hilarious stuff!! Salud. ;)

    As for staying on topic, may as well throw in Spyshelter Firewall into the works. And dismiss any other thread advisement that the user interface is in effect "difficult." The security status even at max can be set to automatically block persistent notifications for user-based decisions. Check out the on-line reviews and also consider that this firewall is compatible with Sandboxie, Shadow Defender (then again, what isn't?), and a plethora of AV/AM applications.
     
    Last edited: Jan 21, 2015
  24. guest

    guest Guest

    As siketa has mentioned, it stands for Classical HIPS. It makes me easier to differentiate types of HIPS, as I consider "HIPS" as an umbrella term.
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.