Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Security Operating Systems Software Windows

Virus Scanners and Process Authentication for Windows? 23

cavedwler asks: "Like alot of people, for one reason or another, I still have Windows running on one of my PC's and have the standard virus scanner and wondered if that is enough. I ran across this site and found a program that seems to work well in conjunction with any virus scanner. It blocks any executable or script from running on your PC without your approval. It is not a virus scanner as it does not search for viruses but just does not allow them to run. It also has the ability to monitor files and restore them in real time if they have been modified. I have been running it for a while now and am thinking of recommend it to my boss for use at work. I was wondering if anyone else out there had tried this, or other programs similar to it, in a real world environment and had any problems or successes."
This discussion has been archived. No new comments can be posted.

Virus Scanners and Process Authentication for Windows?

Comments Filter:
  • SecureEXE (Score:3, Interesting)

    by itwerx ( 165526 ) on Friday July 25, 2003 @07:48PM (#6536882) Homepage
    Sounds a lot like SecureEXE [securewave.com].
  • theoretically (Score:2, Informative)

    by thexaspect ( 552088 )
    while this sounds great in theory, if your virus software is as up to date as it should be on an important box, then how would these scripts be a problem? i've had outlood running on my desktop for YEARS and have received at least one email that contained all of the "famous" virus/scripts, and i've never had a problem. if you have your software set to NOT OPEN ANYTHING you dont tell it to, you dont have a problem. save your IT department some moeny and implement policies or some other such feature. just my
  • by rhild ( 659603 ) on Friday July 25, 2003 @08:11PM (#6537031) Homepage
    The combination of: will keep your Windows box free of all sorts of nasty things for FREE.
    • s/ZoneAlarm/Kerio Personal Firewall/g

      http://www.kerio.com/

      Much more powerful than ZoneAlarm.
      • by Permission Denied ( 551645 ) on Friday July 25, 2003 @09:37PM (#6537441) Journal
        Funny thing about Kerio is that it works by hooking calls into wsock32.dll. You can write a simple program that does not use winsock and it bypasses Kerio.

        Download winpcap [polito.it]. Unlike Unix libpcap, it includes both functions to create packets as well as capture them. It does not use winsock but rather installs an NDIS driver that sits lower in the TCP stack. You can then write a simple program that listens for packets and then manually constructs packets with UDP/TCP headers and sends them out. Completely bypasses Kerio.

        If you'd like, I can post the code. I tested this about a month ago and it worked against the latest version of Kerio Personal Firewall. Took about an hour of work for a proof-of-concept program. You could get really crazy and implement a TCP stack in userspace and then write all kinds of trojans that would bypass TPF. Only works with privileged accounts since you need permissions to install an NDIS driver, but outside of controlled corporate environments, all Windows users use the Administrator account anyway.

        Sygate and ZoneAlarm both install low-level NDIS drivers and are not susceptible to this attack. (At least I couldn't figure out how to bypass them - it may be possible to install a TDI hook which sits below NDIS, but this looks like months of work.)

        Other than that, TPF really is much nicer than Sygate or ZoneAlarm, but this is a pretty gaping hole. I'd recommend Sygate over ZoneAlarm.

        • by Anonymous Coward
          all Windows users use the Administrator account anyway.

          I don't. I never log in as Administrator (or as an account in the Admiistrators group) on my windows box, just as I don't log in as root on my *BSD boxes.

          Just because you don't know how to operate in a windows environment, that doesn't mean that everybody doesn't know. "Runas" is your friend.
        • Actually I think the preferred method for busting through software firewalls these days is just to co-opt a trusted program to do your communications for you. For example, consider a virus/trojan like BUGBEAR or SOBIG, which deploy in stages and often communicate to various hard-coded web URLs for further instructions. All you need to do is create an IE ActiveX control (or script the actual iexplore.exe) and hide its window off-screen or something, and use it to do your http connections... the firewall wi
          • You're off on the shatter vulnerability.
            Microsoft's patch removed the WM_TIMER message. Also, on an unpatched box, it will not work if the application has a WM_TIMER handler, which is a trivial fix to implement in source.
            Even if the application is vulnerable, making the exploit work reliably is not trivial, and is different for each version of each application. It's feasible, but a lot more difficult than you imply.
    • I found that one of my biggest beefs with ZoneAlarm is the sheer lag it impeded upon my connections. Not that it's a bad product, I found it extremely useful for locking certain apps from internet access (non-infected apps that liked to "call home") - but when I switched to using an old PC as a routing server things become much faster.

      Of course, back then I didn't know IPtables... but there are other solutions [sourceforge.net] that do just as well. 486's with dual-NICS can run as these... but hell an older P1 will handle
    • Link [kolla.de].
  • by alyandon ( 163926 ) on Friday July 25, 2003 @08:24PM (#6537101) Homepage
    but do you really need them? Stuff like that tends to confuse the non-technical user types.

    I find it far more effective to make sure that people aren't running as privileged users under NT. If they aren't running as a privileged user and you have a decent virus scanner that has up to date definitions you'll take care of 99.9% of the threats out there. Worst case scenario... some virus/worm wipes out the user's documents folder.

    It really isn't that hard to properly secure NT/2000/XP... I just rarely see the IT staff of most companies bothering to do it.
    • Worst case scenario... some virus/worm wipes out the user's documents folder.
      or, some virus/worm wipes out the 30GB of corporate data that's on a mapped drive that the user has read/write access to....

  • What if this software recorded a category and you could choose what category of software you wanted to run? No more clicking on the should this run dialog.

    What an idea? Maybe something could be put into a permissions file. Oh wait...
  • by ewhenn ( 647989 ) on Friday July 25, 2003 @08:52PM (#6537235)
    ... it always prompts me it i REALLY want to run SexDialer.exe Of course I do! This bug needs to be fixed!
  • and only if the ppl at your work know what they are doing. I used to work in a company where some employess saw the "Download the magical executable and see her ride" ,and they would (the employees i am talking about are programmers actually, or so called, i am sad to say). So it might be good for you, or your boss, who know what your are doing, but dont assume every one is as smart my pal. God created stupidty to haunt us.... FOREVER..:)
  • Some viruses (actually, most) do not come in the directly executable flavor any more, I think.
  • Like alarge number of people, for along time there's been one
    particular mistake by others at the top of alist of things
    that annoy me. Why can't people be alittle more careful with
    their grammar? One has to draw aline somewhere, don't be aloser.

    YAW.

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...