persian-boy

Members
  • Content count

    175
  • Joined

  • Last visited

  • Days Won

    3

persian-boy last won the day on November 11

persian-boy had the most liked content!

About persian-boy

  • Rank
    N/A

Profile Information

  • Gender
    Male
  1. Quantum attacks

    https://www.wired.com/story/quantum-computing-is-coming-for-your-data/ Hi, I will be happy if Eset tells me what kind of plan they have to Protect me or Endpoints from such attacks?
  2. Banking mode doesn't work with Yandex browser but IDC!!why you do care?it's not important!
  3. I think there is smth wrong with your DNS, Isp or VPN because I don't have such problem!change your DNS? turn off VPN or reset internet settings? Yes normal but sadly Eset refuse to provide a changelog for these micro updates :-) I think you are talking about the HIPS?!if yes then set it to learning(since you don't understand this)mode and your problem will be gone!the learning mode won't alert to anything!you have to provide some screenshot. You shouldn't install the version 10! because Eset added many features to the new version! not a wise choice! but you can try to remove Eset from safe mode: https://support.eset.com/kb2289/?locale=en_US
  4. Does it apply to chromium forks? or only chrome?
  5. I think macros will report it if he considers it as a bug! it's not a bug but like a bug!this is a weakness in windows!but Eset can fix it!
  6. What? The moderators already saw my comments! no need to submit anything to Eset!they are not blind.
  7. Eset windows 7 users are in danger because there is no Signed Driver Enforcement.pls, find a solution to this problem! I'm wondering why no one answer!isn't important?Lol, this tool bypass the whole protection!and Eset is silent!
  8. Suggestion: Pls make Hips to ask when a process wants to load a driver!
  9. I know about Signed Driver Enforcement but I'm not talking about this!the problem is more than that. Hips is there to protect my files:D idc! Whats the point with Hips?its suppose to protect me :-)? Also, ESET hips don't alert you when smth wants to load a driver! while comodo ask! What if it's signed?I know it's not common but what if?PChunter can dmg every protected file by Eset! ppl paid for protection!xd while the hips not gonna work in this situation! Look at comodo: it's smarter that Eset in this situation.
  10. Sorry, but I lost my mind:D When the user locks His files with Hips then he wants Eset to protect them!right? not everyone is malware analysis Lol ! not everyone knows an allowed driver can bypass the whole protection?!btw with or without an infected driver Hips should protect the files because the user relied on it!just imagine if it was a zero-day, not Pchunter! then what?
  11. I could even remove the Eset files and folders with this tool! that's sound bad! I gtg! but will back for an answer! P.s This tool made by Chinese! keep up the bad work Eset:P
  12. Hi, There is a tooL call Pc Hunter!it can remove every file, folder, driver and... with one click! I tested it against comodo Hips and Comodo failed to protect my protected files form change!! Just tested it against Eset and the same story! I asked hips to protect some files! then run my tool and force remove those files! Not even one alert from HIPS!the files gone :-( my next generation protection failed. An expert told me how it works(all from that guy): It probably bypasses API hooks for file removal with a system call to NtDeleteFile, or it uses a kernel-mode device driver to remove files without triggering NtDeleteFile hook on SSDT/FltRegisterFilter callback. I'm betting on the latter being the reason why it bypasses your HIPS. If it installed a driver without consent according to your HIPS configuration then it probably used a work-around for that too. There are many ways to work-around HIPS, you just need to know how the monitoring is applied. I mean I've never used the software you're referring to but I know it is genuine security software and appears to be aimed at cleaning rootkits infections, so you'd expect them to have great knowledge on Windows Internals which is more or less the entry point to bypassing features like HIPS. There are many ways to install a device driver. The first method would be relying on the normal service manager to create and start a Windows Service for a device driver. The second method would be applying registry modifications to setup the device driver installation (basically replicating what the service manager will do for initialisation before the start operation) and then using Native API functions like NtLoadDriver to start the service. The third method would be using an undocumented Native API function called NtSetSystemInformation, which is something that Microsoft used in the past for this same thing (which is how the technique was discovered). Another method could be injecting code into another process and have it load the driver for you. Another method could be patching an existent driver which isn't active but can be accessed on disk for read/write and then have that utilised automatically at boot, etc. The NtLoadDriver and NtSetSystemInformation techniques are commonly only ever used in malicious software, but their use is not prevalent. Especially not nowadays at-least. Genuine software usually uses the documented service manager APIs, but when it comes down to security software, it would be reasonable to expect a sense of undocumented things going on because sometimes it is the only way to achieve the desired result. This is also why some security software causes crashes on new updates to Windows (e.g. new OS version won't be supported for X amount of time because the vendor needs to start reverse engineering and maintain support for "undocumented" things it may have been previously doing for specific features). We also would need to look at how the HIPS product you are using actually works. It may be the case of both kernel-mode and user-mode components, and reverse engineering the software would reveal the technique the vendor is using to have implemented the specific feature of discussion - of course I am not going to reverse engineer genuine security software since this is unnecessary and illegal, but you should get the understanding of what I am trying to say. If a security product is injecting code into running processes to control execution flow for when specific APIs are used, but the author of the software decides to make a "custom" wrapper for the targeted controlled function (or in the case of NTAPI invocation, relying on a direct system call), then that would be bypassed. Whereas, if a specific feature is implemented from kernel-mode, then the user-mode program would not be making progress by using undocumented tricks like a system call because it'd still pass through the security software's interception once it reaches kernel-mode level. In a situation like that, it would require a zero-day exploit or a work-around overlooked by the vendor which implemented the feature (e.g. a vendor may block X action but may have forgotten there was another way to do the same action which isn't under the scope of their monitoring yet). Malware can do these things and it could have done them for years. If we take a step back to the times around 2006 - 2012 there was some really deadly threats from those times surrounding rootkit infections which could do complex and sophisticated things, applying techniques to surpass behavioural prevention. However, without a bypass for PatchGuard (Driver Signature Enforcement feature specifically), you must have a signed device driver on 64-bit systems. Due to this, and due to many people moving to 64-bit over the many years since such a feature was introduced back on Windows Vista, the malware in the wild has significantly changed. It isn't normally about virus infections or rootkits to subvert even security software to hide other malicious software nowadays, but about generating income through ransomware and adware - those are the prevalent threats nowadays as far as I am aware. In fact, even banking malware has plummeted down a lot recently in my opinion - still popular though. It would have been common to find samples for Carberp, Zeus, SpyEye a few years ago, not as common nowadays. You have more chances of finding BadRabbit nowadays or a similar ransomware outbreak. As for removing system files, you can delete files which are even in use as long as you have the correct privileges. For example, you cannot delete a file in a protected directory without having the rights to access those files with delete requests (e.g. acquire administrator rights); files in use can be deleted via a Native API function called NtDeleteFile. You can do this from user-mode thanks to NTDLL which sends requests up to a kernel routine which eventually leads to the real function within ntoskrnl.exe (kernel-mode image -> the Windows Kernel to be precise). Explorer.exe and most other software relies on the normal Win32 API which will lead down to the Native API calls in NTDLL (-> Kernel), but when you use Native API functions from NTDLL to pass to kernel-mode directly in this way, you bypass the checks performed by the documented and Microsoft supported-for-use functions which are supposed to be used by developers. Alternatively, just use a kernel-mode device driver and then you can invoke kernel-mode only functions (instead of the original Zw routines) to make a wrapper for the Nt* functions using the kernel-mode only functions instead (which they would have originally called anyway), whilst bypassing kernel-mode callbacks registered by other device drivers (e.g. maybe by a security product) or potential kernel-mode patches which may be present (32-bit systems). The documented APIs will perform checks and put up restrictions for removing files in-use by other processes. The undocumented APIs won't necessarily have those checks, unless they are enforced from kernel-mode level under the original Windows Kernel routine which ends up being executed for the desired functionality which would be the end-result. This explains why you may not be able to delete GenuinePhotoshop.dll which is executing under GenuinePhotoshop.exe from the normal Windows File Explorer, whilst an external security tool like you have referred to will be capable of doing so. it uses a kernel-mode device driver to remove files without triggering NtDeleteFile hook on SSDT/FltRegisterFilter callback. It is because of x64 limitations for kernel-mode interception and ethical requirements. If an AV vendor patches the kernel and it all goes pear shaped, that is on them - they lose customers because of crashes and maybe even have to spend trouble dealing with law-suits if the data-loss was really bad. Btw Eset idc! what can you do for such thing?! I didn't know an allowed driver can bypass the whole Hips! where is my protection? you left me unprotected - _ - same for comodo hips! still didn't test the spyshelter! but probably the same result:D
  13. Eset don't you want to fix this auto allow? more dangerous than useful!omg. Every HIPS(Comodo.spyshelter, Rehips and...) freeze the operation till the user answer the alert! whats the point of asking rule if its gonna allow it without my permission?! make no sense! Itman I know about those internal rules but I'm saying the interactive mod doesn't cover all operations! This is dangerous!Eset pls fix the bug! Eset updating the hips module in silent and without any changelog or information!that's bad!
  14. Any feedback on this? is it there ? or no? I just want to know. cowboy, what do you think about this feature?
  15. Some Suggestion about HIPS: 1- Add protection for direct keyboard access. 2- What about a purge button for not exist rules? I asked this before -.- From Eset website: interactive mode: In interactive mode HIPS will prompt you to Allow or Deny each operation detected. This is not true! I got different alerts when I set the ask rules for some applications.I mean the ask rule is better than interactive mode!interactive mode doesn't cover all operations.so I have to use int mode plus some custom ask rules. Thanks for the info Itman! but where that malware come from?I use sandboxie+srp+hips+eset av+some grp policy tweaks and some other tweaks like disabling useless services by AnVir Task Manager. so there is no malware to create an infected service! I didn't know about it! Eset pls listen to what Itman say:D I want the maximum protection(99%).