Jump to content

Recommended Posts

Posted (edited)

I created a HIPS rule to protect it from modification. Using Process Explorer checked to see if any Eset .dlls injected indicating that it is indeed protected. Zip, Nada, nothing present. Eset .dlls have been injected into everything else where I created a HIPS rule for them. Ieplorer, explorer, etc. have Eset .dlls injected. Emsisoft Anti-malware and EMET have their .dlls injected into Adobe Reader.

 

Just how is Eset protecting Abode Reader?

Edited by itman
Posted

I created a HIPS rule to protect it from modification. Using Process Explorer checked to see if any Eset .dlls injected indicating that it is indeed protected. Zip, Nada, nothing present. Eset .dlls have been injected into everything else where I created a HIPS rule for them. Ieplorer, explorer, etc. have Eset .dlls injected. Emsisoft Anti-malware and EMET have their .dlls injected into Adobe Reader.

 

Just how is Eset protecting Abode Reader?

Update.

 

I have been doing some intensive testing since I last posted. The good news is the HIPS works great. Feature wise it is something out of the stone age but it is very responsive and accurate as far as created rules.

 

As far as the exploit protection, the only thing I saw where Eset .dll injection is occurring is upon the start up of a new explorer.exe instance. It was not like this at Eset installation; I saw Eset .dlls being injected into IE10 up until recently. I also did reset the HIPS to it's default setting; no help. The best I can determine is the recent IE 10 and Adobe reader updates have broke it.  

Posted

Update 2.

 

Just completed testing SS 8 exploit protection using Surfright's Exploit Test Tool. SS 8's protection about equal to that provided by EMET 5.2 as far as IE10 browser protection goes. This confirmed by recent AV lab tests showing both in the 80% range as far as exploit detection goes. Both failed heapspray tests miserably. So it appears SS 8 memory protection more akin to vaporware. So, .dll injection not utilized or needed by SS 8 exploit protection. 

 

Only thing I did not like about SS 8 exploit protection is zip alerts or logging occurred when it stopped an exploit. At least some recording of the activity should be given to the user.

Posted

Looks like I was initially right all along. Eset does indeed not inject its hook .dll, eplgHooks.dll, into Adobe Reader.

 

Appears I might have been preventing the loading of eplgHooks.dll into IE10 and explorer.exe; most likely by one of the HIPS rules I have created. In any case, the Eset hook injection is now working properly; at least for everything except Adobe Reader.

 

Strongly suspect that Eset hasn't been able to find away around Reader's sandboxing option. This doesn't appear to be a problem for EMET or Emsisoft though; both inject their hook .dlls without issue.

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...