Infection Resolving Team

Re: Security Team

Almost 10 years as an independent New Unknown Variant tester for major AV companies, helped with development of Spybot, HijackThis, and worked with Lavasoft on AdAware, decompiled & tested over 750 trojan programs and over 1500 virus and wrote signature files for many of these new variants. Received lifetime membership to VirusBulletin for my work...do I qualify..? ;)

I also try to stay current on the latest testing techniques, what independent labs are using proper testing, and what security programs are currently ranked top programs at the best labs.
I've been out of the loop lately due to health concerns but I still know my way around security pretty good. I help out with folks security concerns as I can these days so I'll help in our lil informal group here as I can.
 

My Computer

System One

  • Manufacturer/Model
    Personal Build
    CPU
    Intel E6750 Core 2 Duo
    Motherboard
    Asus Commando MoBo (P965/ICH8R)
    Memory
    4G's Crucial Ballistix Tracer DDR2 PC26400 RAM
    Graphics card(s)
    BFG 8800GTS OC2 320MB
    Sound Card
    Creative Sound Blaster X-FI Platinum FATAL1TY (next)
    Monitor(s) Displays
    2 x 22" w2207 LCD Monitors
    Screen Resolution
    1- 1680 x 1050, 1 - 1920 x 1080
    Hard Drives
    3 x 500G SATA II WD Caviar HDD's
    PSU
    EnerMax NoiseTaker II 600W
    Case
    NZXT Lexa Classic (modified, dual doored & windowed)
    Cooling
    Zalman 9700 CPU cooler, 4-120mm fans, 1-90mm
    Mouse
    Logitech Optical Trackman trackball
    Other Info
    NZXT Lexa Classic Case, Zalman 9700 CPU Cooler, 2 DVD Burners c/w LightScribe (Sony, TSST), Enermax NoiseTaker II 600W PSU with Custom Chrome cable sleeving, Hauppauge HDTV TV Tuner Card, 5.1 Logitech Z5500 speakers, 15 in 1 Multi-card reader
Re: Security Team

Almost 10 years as an independent New Unknown Variant tester for major AV companies, helped with development of Spybot, HijackThis, and worked with Lavasoft on AdAware, decompiled & tested over 750 trojan programs and over 1500 virus and wrote signature files for many of these new variants. Received lifetime membership to VirusBulletin for my work...do I qualify..? ;)

I also try to stay current on the latest testing techniques, what independent labs are using proper testing, and what security programs are currently ranked top programs at the best labs.
I've been out of the loop lately due to health concerns but I still know my way around security pretty good. I help out with folks security concerns as I can these days so I'll help in our lil informal group here as I can.


I would think so. It is nice to have someone who really knows to keep us on the straight and narrow and point out when we are going wrong. And, looking at the list of achievements, you have been busy, and, that IS really impressive, you've got my vote.

Norm
 

My Computer

System One

  • Manufacturer/Model
    Scratch Built
    CPU
    Intel Quad Core 6600
    Motherboard
    Asus P5B
    Memory
    4096 MB Xtreme-Dark 800mhz
    Graphics card(s)
    Zotac Amp Edition 8800GT - 512MB DDR3, O/C 700mhz
    Monitor(s) Displays
    Samsung 206BW
    Screen Resolution
    1680 X 1024
    Hard Drives
    4 X Samsung 500GB 7200rpm Serial ATA-II HDD w. 16MB Cache .
    PSU
    550 w
    Case
    Thermaltake
    Cooling
    3 x octua NF-S12-1200 - 120mm 1200RPM Sound Optimised Fans
    Mouse
    Targus
    Keyboard
    Microsoft
    Internet Speed
    1500kbs
    Other Info
    Self built.
Re: Security Team

Sounds great Chappy great to have you here.
I have always been wondering something
How do you write the program to scan the files?
I know this is tilting on programming but i was just wondering.
Thanks.
Ben
 

My Computer

System One

  • Manufacturer/Model
    Dell
    CPU
    Intel(R) Celeron(R) CPU 420 @1.60 GHz
    Motherboard
    Dell Inspion 530 Default
    Memory
    PNY 4GB 240-Pin SDRAM DDR2 800 (PC2 6400) Dual Channel
    Graphics card(s)
    ATI Radeon HD 2400 PRO
    Sound Card
    Realtek HD Audio
    Monitor(s) Displays
    Gateway PnP Monitor
    Screen Resolution
    1024x768 @ 75 Hz
    Hard Drives
    Seagate 250G ATA SATA-II
    Case
    Dell Inspiron 530
    Cooling
    None
    Mouse
    Logitech EX100 Combo
    Keyboard
    Logitech EX100 Combo
    Internet Speed
    100 MB/s
Re: Security Team

The menace of Worms
It is a given in this world that every entity has two aspects - one benign, and the other malignant. This duality of function can be found in virtually everything. Take the humble kitchen knife, for example. Cooks use it for chopping vegetables. It can also be used to kill. The human brain can be used to do constructive things - such as planting seeds in farms to grow food crops, construct strong shelters that protect against nature's forces and build computers and software that make life so easy. The human brain can also do destructive things - such as build a bomb, indulge in genocide and take advantages of the computer's weaknesses to wreck havoc the internet.
The worms are but another example of man's darker side of genius.
Worms are such pesky creatures. They apparently appear out of nowhere and start doing what their creators designed them to do; our only clue is that the PC and the internet are suddenly inexplicably slow. Their reproducing and replicating mechanisms are so simple. Computer worms share similar attributes. They are apparently very easy to construct too.
The first worm that attracted wide attention was actually written by a student! When it was released to an unsuspecting world in 1988, it damaged a lot of BSD UNIX machines before an angry world could track it down and catch both the worm and its creator red-handed. The boy - Robert Tappan Morris Jr. - was convicted and fined.
So, what exactly is a computer worm?
A computer worm is different from its other infamous sibling - the virus. A worm does not infect or manipulate files, it makes clones of itself. Therefore a worm is a standalone working program. It can use the system transmission capabilities to travel from machine to machine merrily riding around like a happy-go-lucky vagabond. A worm, after lodging itself on one machine can spawn several clones of itself. Each of these clones then marches forth to conquer the cyber world.
How do worms spread?
Where do newly cloned computer worms march to? A worm can open your email address book and, in a jiffy, despatch one clone each to each of the addresses listed. Of course, the machine has to be connected to the net. If it is not, the worm silently bides it time till the connection takes place. Chats and Instant messaging software like MIRC, MSN Messenger, Yahoo IM and ICQ can also act as unwitting carriers enabling the worm to spread like wildfire throughout the cyberworld (the "Jitux" worm is an example). Every operating system has vulnerabilities which are thoroughly exploited by worms to propagate themselves. Windows systems are the usual target. A very prominent example of this is the Sasser worm which uses security holes in the Windows LSASS service.
Other worms spread only by using Backdoor infected computers. E.g. the "Bormex" worm relies on the "Back Orifice" backdoor to spread. There is a facility available within peer-to-peer networks known as the P2P folder which all users of the network share. A worm can simply copy itself into the shared folder and quietly wait for the other users to pick it up. If the folder does not exist, the worm simply creates it for the benefit of the users! How benevolent can worms be! In the hall of hoodlums, worm "Axam" gets top honours for such devious activity.
Some worms take on even more deceptive forms to snare users. Sending emails with malicious code embedded within the main text or as an attachment. Some worms act as SMTP proxies (Sircam, Nimda, Sasser & co) to spread quickly. Worms can attempt remote logins (especially on Microsoft SQL servers - the "Spida" worm does this quite elegantly!) to launch DDoS (distributed denial of service) attacks. Another favourite is injecting malicious code in running services on the server like "Slammer". Phew! The arsenal available to these worms is huge and ever growing.
Worms that will be remembered for generations to come for the damage they did to global commerce are Sasser, MyDoom, Sober, Blaster, Code Red, Melissa, and the Loveletter worm. Apart from the sleepless nights it caused the government and industry backed sleuths trying to track the worm, billions of dollars went down the drain to control their menace. The face of internet surfing and computerized operations was radically changed due to these worms.
What exactly is the nature of havoc that these worms bring to bear upon us? Well, Denial of service (DoS) is one situation that users of a server may find themselves in thanks to these programs. Unlike viruses, many worms do not intend to destroy the infected computer. More often than not they have a more important job to do - subvert the computer so that the worm's creator can use it often without the owner of the computer knowing anything about it.
Worm writers nowadays work together with Spammers (they make a nice twosome, don't they?) to send out unsolicited emails to increasingly overloaded inboxes. Their worms install backdoor trojans to convert the home computer into a "zombie". the countless variants of the "Bagle" worm are the best known examples.
"Phishing" is the latest fad in town. It tries to prise those secret passwords of bank accounts and credit cards from you... all courtesy of a piggy back ride on the worm's powerful shoulders
So much for the end-of-the-world-speech! What is the cure for all this, for crying out loud! You ask.
Like a cat-and-mouse game, the moment worms came into existence, worm-trappers came into existence too. Special software has been designed that not only kill worms the software knows about, but also updates itself on a daily basis against any new threats.
However, updating is always going to be a tad behind the ultra-sophisticated lethal wizardry of worms. The best way to guard against this is to use the anti-worm software a-squared - software that it is at the forefront of malware prevention.
How does a-squared score over other anti-worm and anti-virus products?
a-squared has a special Malware Intrusion Detection System (Malware-IDS) that is able to detect and kill worms before the worms get a foot in the door. The great thing about this is that the detection process does not require any signature scanning to identify a worm. All the other products are handicapped because they require a signature to be able to identify and kill a worm.
The Malware-IDS, once installed, never sits idle. Visualize a worrying, paranoid housewife obsessed with keeping the house clean, who runs after every rat or other vermin that she sees with broomstick in hand! Like this housewife, the Malware-IDS is continuously on alert, checking every program that is running (or trying to run) on your machine, ready to pounce on any program that is trying to do something that "good" programs are not supposed to do. Such "delinquent" programs are caught by the IDS and paraded before you. You can relax and take your time to decide whether the program has nefarious intentions or not. The program is stopped until you pronounce verdict. The program is either acquitted honourably or sent to the gallows.
With a strong development and support team spanning continents, a-squared has emerged as an important player in the war against the malware domain. Trusting your machine to a-squared is the best defence possible now and in the future.
Protect thyself!

The source of this articale was http://www.anti-worm-software.com/2005/06/menace-of-worms.html
sorry i didnt include that.
My bad i was in a rush
Yep these stink!!!
 
Last edited:

My Computer

System One

  • Manufacturer/Model
    Dell
    CPU
    Intel(R) Celeron(R) CPU 420 @1.60 GHz
    Motherboard
    Dell Inspion 530 Default
    Memory
    PNY 4GB 240-Pin SDRAM DDR2 800 (PC2 6400) Dual Channel
    Graphics card(s)
    ATI Radeon HD 2400 PRO
    Sound Card
    Realtek HD Audio
    Monitor(s) Displays
    Gateway PnP Monitor
    Screen Resolution
    1024x768 @ 75 Hz
    Hard Drives
    Seagate 250G ATA SATA-II
    Case
    Dell Inspiron 530
    Cooling
    None
    Mouse
    Logitech EX100 Combo
    Keyboard
    Logitech EX100 Combo
    Internet Speed
    100 MB/s
Re: Security Team

Neverhavemoney, that must have taken a long time to type...

Thanks for that. Interesting read. :)
 

My Computer

System One

  • Manufacturer/Model
    Hewlett Packard
    CPU
    3.40Ghz / 2.20Gz Duo Core
    Memory
    2GB / 3GB
    Hard Drives
    160 GB / 160 GB
Re: Security Team

Neverhavemoney, that must have taken a long time to type...

Thanks for that. Interesting read. :)

:D Not if he did a copy/paste :)
It was interesting though and put forward the view that you needed to use a-squared to deal with such worms. ;)
 
Last edited:

My Computer

System One

  • Operating System
    Windows 10 Home
    Manufacturer/Model
    HP Envy x360 Convertible 15-bq0xx
    CPU
    AMD A9 Stoney Ridge Technology
    Motherboard
    HP 8312 (Socket FP4)
    Memory
    8.00GB Dual-Channel Unknown (?-0-0-0)
    Graphics card(s)
    Generic PnP Monitor (1920x1080@60Hz) 512MB ATI AMD Radeon R5
    Sound Card
    AMD High Definition Audio Device Realtek High Definition Aud
    Monitor(s) Displays
    Generic PnP Monitor on AMD Radeon R5 Graphics
    Screen Resolution
    1920 x 1080
    Hard Drives
    119GB SanDisk SD8SN8U-128G-1006 (SSD) 931GB Hitachi HGST HTS721010A9E630 (SATA
    Mouse
    Microsoft Optical Wheel Mouse
    Keyboard
    Standard PS/2 Keyboard
    Internet Speed
    62.86Mbps down 18.19Mbps up
    Other Info
    EPSON78D0CF (XP-332 335 Series) (Default Printer)
Re: Security Team

Sorry guys i just cpoied and pasted that from the link that i added in(edit)
Sorry and i dont use a-squared for those worms i just though everything else was good so i decided to use the articale in ful.
Thanks and sorry for any confusion.
Ben
 

My Computer

System One

  • Manufacturer/Model
    Dell
    CPU
    Intel(R) Celeron(R) CPU 420 @1.60 GHz
    Motherboard
    Dell Inspion 530 Default
    Memory
    PNY 4GB 240-Pin SDRAM DDR2 800 (PC2 6400) Dual Channel
    Graphics card(s)
    ATI Radeon HD 2400 PRO
    Sound Card
    Realtek HD Audio
    Monitor(s) Displays
    Gateway PnP Monitor
    Screen Resolution
    1024x768 @ 75 Hz
    Hard Drives
    Seagate 250G ATA SATA-II
    Case
    Dell Inspiron 530
    Cooling
    None
    Mouse
    Logitech EX100 Combo
    Keyboard
    Logitech EX100 Combo
    Internet Speed
    100 MB/s
Re: Security Team

Sorry guys i just cpoied and pasted that from the link that i added in(edit)
Sorry and i dont use a-squared for those worms i just though everything else was good so i decided to use the articale in ful.
Thanks and sorry for any confusion.
Ben


That's okay Ben, no harm done. We've all done it and mistakes happen:geek:

Norm
 

My Computer

System One

  • Manufacturer/Model
    Scratch Built
    CPU
    Intel Quad Core 6600
    Motherboard
    Asus P5B
    Memory
    4096 MB Xtreme-Dark 800mhz
    Graphics card(s)
    Zotac Amp Edition 8800GT - 512MB DDR3, O/C 700mhz
    Monitor(s) Displays
    Samsung 206BW
    Screen Resolution
    1680 X 1024
    Hard Drives
    4 X Samsung 500GB 7200rpm Serial ATA-II HDD w. 16MB Cache .
    PSU
    550 w
    Case
    Thermaltake
    Cooling
    3 x octua NF-S12-1200 - 120mm 1200RPM Sound Optimised Fans
    Mouse
    Targus
    Keyboard
    Microsoft
    Internet Speed
    1500kbs
    Other Info
    Self built.
Re: Security Team

I have a-squared on my computer, I never use it though. I have always just kept it there in case of an emergency but never needed to run it.
 

My Computer

System One

  • Manufacturer/Model
    Hewlett Packard
    CPU
    3.40Ghz / 2.20Gz Duo Core
    Memory
    2GB / 3GB
    Hard Drives
    160 GB / 160 GB

My Computer

System One

  • Manufacturer/Model
    Scratch Built
    CPU
    Intel Quad Core 6600
    Motherboard
    Asus P5B
    Memory
    4096 MB Xtreme-Dark 800mhz
    Graphics card(s)
    Zotac Amp Edition 8800GT - 512MB DDR3, O/C 700mhz
    Monitor(s) Displays
    Samsung 206BW
    Screen Resolution
    1680 X 1024
    Hard Drives
    4 X Samsung 500GB 7200rpm Serial ATA-II HDD w. 16MB Cache .
    PSU
    550 w
    Case
    Thermaltake
    Cooling
    3 x octua NF-S12-1200 - 120mm 1200RPM Sound Optimised Fans
    Mouse
    Targus
    Keyboard
    Microsoft
    Internet Speed
    1500kbs
    Other Info
    Self built.

My Computer

System One

  • Manufacturer/Model
    Hewlett Packard
    CPU
    3.40Ghz / 2.20Gz Duo Core
    Memory
    2GB / 3GB
    Hard Drives
    160 GB / 160 GB
Re: Security Team

I second A-Squared to be a "low proformance" program.
Dont like it and wont use it or recommend it.
 

My Computer

System One

  • Manufacturer/Model
    Dell
    CPU
    Intel(R) Celeron(R) CPU 420 @1.60 GHz
    Motherboard
    Dell Inspion 530 Default
    Memory
    PNY 4GB 240-Pin SDRAM DDR2 800 (PC2 6400) Dual Channel
    Graphics card(s)
    ATI Radeon HD 2400 PRO
    Sound Card
    Realtek HD Audio
    Monitor(s) Displays
    Gateway PnP Monitor
    Screen Resolution
    1024x768 @ 75 Hz
    Hard Drives
    Seagate 250G ATA SATA-II
    Case
    Dell Inspiron 530
    Cooling
    None
    Mouse
    Logitech EX100 Combo
    Keyboard
    Logitech EX100 Combo
    Internet Speed
    100 MB/s
Re: Security Team

Wow thanks Norm, . I didn't think any security software would be as bad as to quarantine the explorer...

Some have done FAR worse than that over the years my friend..;)
I've seen poorly written scanners corrupt the entire kernel, many times. Before XP & Vista, especially Vista, most AV and security programs had to use kernel patching to interact with the lower system functions and this was always a big problem and HUGE security risk in itself.
Vista originally did not allow ANY kernel patching and that's why the security companies were so slow to release Vista compatible products. Many of them lobbied MS to allow kernel patching again since it was the only way they knew how (at the time I guess) to integrate and update the scanners, but MS stood firm on the side of OS security.
In the end MS had to find a way to allow a certain level of patching while still maintaining the kernel integrity.

But I digress...I have seen scanners delete the WINDOWS folder as "infected"...the Entire folder and not just a possibly infected file within it. I've seen scanners delete every executable file on the system due to a single infected exe...I've seen some that couldn't catch a virus if one fell in the developer lap and screamed "I'M A VIRUS!!!".
I've seen some really poor scanner coding in my day and I'm sure we'll see lots more in the future.

How do you write the program to scan the files?

Do you mean the AV scanner Ben, or the way to scan an unknown file to see if it's infected?

The scanner is a complex piece of coding and that's why so many are not very well done and why it's hard to do it right the first times. That's well out of my league.
But the files I decompiled personally were all sent to me by AV companies to test for unwanted behaviors. Back in the late 90's early 00's, many AV companies used independent testers because they still weren't big enough to employ full time testers yet. When a new unknown variant was picked up by their scanners and sent in for analysis, they would farm these out to us for decompiling and testing. Basically I had a sandboxed system, triple boot (95, 98, W2K, later early XP) and I would monitor what system changes these files did to the OS upon execution. I had specifically built programs for this, mostly supplied by the AV company but other tools as well, many Linux based but with Windows GUI's.

After finding out what the file did to the system I would sandbox it on my main system and decompile the file to see what function calls and other things it did like port opening, listeners, dialers, keyloggers, smtp server...etc. Then I would compile a report about the file and it's functions and if possible I would recommend the type of signature base I would use against it. Back then AV's used sig files to combat malware since that was about all there was but some companies like Eset were working on their heuristics engines which really work well on unknown malware behaviors.

All the AV companies stopped using independents by around 2004 and I quit in late 02. I found it hard to keep up with the complexity (and sheer volume) of new variants as they started using professional software engineers to write malware and it left the realm of the simple hacker types and skript kiddies. I tell you..much of the malware is better written than most legal programs out there lately and it takes real professional engineers to do that work now.
It was fun while it lasted tho and I met allot of cool and very smart people and learned allot of what went on behind the doors.
 

My Computer

System One

  • Manufacturer/Model
    Personal Build
    CPU
    Intel E6750 Core 2 Duo
    Motherboard
    Asus Commando MoBo (P965/ICH8R)
    Memory
    4G's Crucial Ballistix Tracer DDR2 PC26400 RAM
    Graphics card(s)
    BFG 8800GTS OC2 320MB
    Sound Card
    Creative Sound Blaster X-FI Platinum FATAL1TY (next)
    Monitor(s) Displays
    2 x 22" w2207 LCD Monitors
    Screen Resolution
    1- 1680 x 1050, 1 - 1920 x 1080
    Hard Drives
    3 x 500G SATA II WD Caviar HDD's
    PSU
    EnerMax NoiseTaker II 600W
    Case
    NZXT Lexa Classic (modified, dual doored & windowed)
    Cooling
    Zalman 9700 CPU cooler, 4-120mm fans, 1-90mm
    Mouse
    Logitech Optical Trackman trackball
    Other Info
    NZXT Lexa Classic Case, Zalman 9700 CPU Cooler, 2 DVD Burners c/w LightScribe (Sony, TSST), Enermax NoiseTaker II 600W PSU with Custom Chrome cable sleeving, Hauppauge HDTV TV Tuner Card, 5.1 Logitech Z5500 speakers, 15 in 1 Multi-card reader
Re: Security Team

Wow thanks Norm, . I didn't think any security software would be as bad as to quarantine the explorer...
Some have done FAR worse than that over the years my friend..;)
I've seen poorly written scanners corrupt the entire kernel, many times. Before XP & Vista, especially Vista, most AV and security programs had to use kernel patching to interact with the lower system functions and this was always a big problem and HUGE security risk in itself.
Vista originally did not allow ANY kernel patching and that's why the security companies were so slow to release Vista compatible products. Many of them lobbied MS to allow kernel patching again since it was the only way they knew how (at the time I guess) to integrate and update the scanners, but MS stood firm on the side of OS security.
In the end MS had to find a way to allow a certain level of patching while still maintaining the kernel integrity.

But I digress...I have seen scanners delete the WINDOWS folder as "infected"...the Entire folder and not just a possibly infected file within it. I've seen scanners delete every executable file on the system due to a single infected exe...I've seen some that couldn't catch a virus if one fell in the developer lap and screamed "I'M A VIRUS!!!".
I've seen some really poor scanner coding in my day and I'm sure we'll see lots more in the future.

How do you write the program to scan the files?
Do you mean the AV scanner Ben, or the way to scan an unknown file to see if it's infected?

The scanner is a complex piece of coding and that's why so many are not very well done and why it's hard to do it right the first times. That's well out of my league.
But the files I decompiled personally were all sent to me by AV companies to test for unwanted behaviors. Back in the late 90's early 00's, many AV companies used independent testers because they still weren't big enough to employ full time testers yet. When a new unknown variant was picked up by their scanners and sent in for analysis, they would farm these out to us for decompiling and testing. Basically I had a sandboxed system, triple boot (95, 98, W2K, later early XP) and I would monitor what system changes these files did to the OS upon execution. I had specifically built programs for this, mostly supplied by the AV company but other tools as well, many Linux based but with Windows GUI's.

After finding out what the file did to the system I would sandbox it on my main system and decompile the file to see what function calls and other things it did like port opening, listeners, dialers, keyloggers, smtp server...etc. Then I would compile a report about the file and it's functions and if possible I would recommend the type of signature base I would use against it. Back then AV's used sig files to combat malware since that was about all there was but some companies like Eset were working on their heuristics engines which really work well on unknown malware behaviors.

All the AV companies stopped using independents by around 2004 and I quit in late 02. I found it hard to keep up with the complexity (and sheer volume) of new variants as they started using professional software engineers to write malware and it left the realm of the simple hacker types and skript kiddies. I tell you..much of the malware is better written than most legal programs out there lately and it takes real professional engineers to do that work now.
It was fun while it lasted tho and I met allot of cool and very smart people and learned allot of what went on behind the doors.

Thanks Chappie, welcome back.

Norm
 

My Computer

System One

  • Manufacturer/Model
    Scratch Built
    CPU
    Intel Quad Core 6600
    Motherboard
    Asus P5B
    Memory
    4096 MB Xtreme-Dark 800mhz
    Graphics card(s)
    Zotac Amp Edition 8800GT - 512MB DDR3, O/C 700mhz
    Monitor(s) Displays
    Samsung 206BW
    Screen Resolution
    1680 X 1024
    Hard Drives
    4 X Samsung 500GB 7200rpm Serial ATA-II HDD w. 16MB Cache .
    PSU
    550 w
    Case
    Thermaltake
    Cooling
    3 x octua NF-S12-1200 - 120mm 1200RPM Sound Optimised Fans
    Mouse
    Targus
    Keyboard
    Microsoft
    Internet Speed
    1500kbs
    Other Info
    Self built.
Re: Security Team

How do you write the program to scan the files?
Do you mean the AV scanner Ben, or the way to scan an unknown file to see if it's infected?

The scanner is a complex piece of coding and that's why so many are not very well done and why it's hard to do it right the first times. That's well out of my league.


Hey Chappy,

Scanning files is easy ;)
Code:
{
    foreach (Files.FIND_DATA file in Files.GetFilesEx(SysPath + "\\", FileIO.SearchAllSubDirectories)) {
        FileSigCheck();
    }
}
Using this example, it scans the entire directory specified by the "SysPath" attribute where I can then input each file into the FileSigCheck function for processing of each file found ;)

Its the way they pass file parameters and check file signatures thats the huge problem with nearly all AV scanners...

To give you a better picture of my code in action, I used the system Directory (DarkGreen entries are files protected by Windows built-in System File Check)

Each file is passed into FileSigCheck() then it checks a predetermined set of heuristics and signature checks to specify color depending on the files identified (currently 3000 different results) ;)

attachment.php



I have been working on an huge update to my System File Check Utility found in the Tutorial Section if anyone is interested in giving this new scanning engine a try? (pictured above) :geek:

Steven
 

Attachments

  • FileSearch.JPG
    FileSearch.JPG
    217.5 KB · Views: 123

My Computer

Re: Security Team

Scanning files is easy ;)
Code:
{
    foreach (Files.FIND_DATA file in Files.GetFilesEx(SysPath + "\\", FileIO.SearchAllSubDirectories)) {
        FileSigCheck();
    }
}
Using this example, it scans the entire directory specified by the "SysPath" attribute where I can then input each file into the FileSigCheck function for processing of each file found ;)

I have been working on an huge update to my System File Check Utility found in the Tutorial Section if anyone is interested in giving this new scanning engine a try? (pictured above) :geek:

Steven


Hi Steven, Of course it's easy. I could do that, piece of cake. Of course I'd have a wee problem understanding it. Not that :geek:'y

I have however used your System File Check Utility, a magic little utility and one I thoroughly recommend to all. An upgrade would be the icing on the cake for what is already a great tool.

Norm
 

My Computer

System One

  • Manufacturer/Model
    Scratch Built
    CPU
    Intel Quad Core 6600
    Motherboard
    Asus P5B
    Memory
    4096 MB Xtreme-Dark 800mhz
    Graphics card(s)
    Zotac Amp Edition 8800GT - 512MB DDR3, O/C 700mhz
    Monitor(s) Displays
    Samsung 206BW
    Screen Resolution
    1680 X 1024
    Hard Drives
    4 X Samsung 500GB 7200rpm Serial ATA-II HDD w. 16MB Cache .
    PSU
    550 w
    Case
    Thermaltake
    Cooling
    3 x octua NF-S12-1200 - 120mm 1200RPM Sound Optimised Fans
    Mouse
    Targus
    Keyboard
    Microsoft
    Internet Speed
    1500kbs
    Other Info
    Self built.
Re: Security Team

Hi Dmex

Well done my friend!
Did you develop the heuristics engine yourself? If so, how did you incorporate the 1000's of behaviors that current malware can exploit, or did you use access calls to system files or stacks as a main read on malware behavior?

I'd be very interested to know a bit more...my coding is rusty to the point of being seized up solid, so I'm not much help that way, but I can test things if you need. I'll d'load your utility tonite and have a look see. Of course I would not think of trying to decompile your work but if you have a code sample I can look at I would appreciate that.

Thanx Norm, it's good to be back!

Edit - After a re-read on your utility dmex, is it strictly a system file check utility, or does it have the capability to recognize other parameters? I would love to know more if that's cool by you.
 

My Computer

System One

  • Manufacturer/Model
    Personal Build
    CPU
    Intel E6750 Core 2 Duo
    Motherboard
    Asus Commando MoBo (P965/ICH8R)
    Memory
    4G's Crucial Ballistix Tracer DDR2 PC26400 RAM
    Graphics card(s)
    BFG 8800GTS OC2 320MB
    Sound Card
    Creative Sound Blaster X-FI Platinum FATAL1TY (next)
    Monitor(s) Displays
    2 x 22" w2207 LCD Monitors
    Screen Resolution
    1- 1680 x 1050, 1 - 1920 x 1080
    Hard Drives
    3 x 500G SATA II WD Caviar HDD's
    PSU
    EnerMax NoiseTaker II 600W
    Case
    NZXT Lexa Classic (modified, dual doored & windowed)
    Cooling
    Zalman 9700 CPU cooler, 4-120mm fans, 1-90mm
    Mouse
    Logitech Optical Trackman trackball
    Other Info
    NZXT Lexa Classic Case, Zalman 9700 CPU Cooler, 2 DVD Burners c/w LightScribe (Sony, TSST), Enermax NoiseTaker II 600W PSU with Custom Chrome cable sleeving, Hauppauge HDTV TV Tuner Card, 5.1 Logitech Z5500 speakers, 15 in 1 Multi-card reader
Re: Security Team

Hey everyone here are the current members:
Neverhavemoney
Brink
mansrm81
barman58
.Joe
NormCameron

If you wish to post paid-for security tools, you may but you need to include a price for a single license though







Also i am asking everyone to post FREE security tools and i will include them in the nightly post of members. If you are using these let me know and i will put your name beside the program. Here is the current list:
  • Ad-Aware 2008 - mansrm81
  • A-Squared Free -
  • Avast Antivirus Home Edition - mansrm81
  • Avira AntiVir Personal -
  • AVG Antivirus -
  • Comodo Internet Security - Neverhavemoney
  • Comodo Memory Firewall -
  • MalwareBites - Neverhavemoney
  • Spybot Search & Destroy - mansrm81, Neverhavemoney
  • SpywareBlaster -
  • Spyware Terminator -
  • SUPERAntiSpyware -
  • WinPatrol -
I use SUPERAntispyware.
 

My Computer

System One

  • Manufacturer/Model
    Compaq
    CPU
    intel core 2 duo T 5550 @ 1.83 MHz
    Motherboard
    intel 965 chipset family
    Memory
    2 GB DDR 2 SD RAM @ 667 MHz
    Graphics card(s)
    On board upto 358 MB RAM
    Sound Card
    Onboard
    Monitor(s) Displays
    15"
    Hard Drives
    160 GB WDC
Re: Security Team

Hi Norm ,

That's strange, I have scanned my pc with a squared free many times without a problem . Maybe they have improved it since that review.

SIW2
 

My Computers

System One System Two

  • Operating System
    Vista
    CPU
    Intel E8400
    Motherboard
    ASRock1333-GLAN R2.0
    Memory
    4gb DDR2 800
    Graphics card(s)
    nvidia 9500GT 1gb
  • Operating System
    win7/vista
    CPU
    intel i5-8400
    Motherboard
    gigabyte b365m ds3h
    Memory
    ballistix 2x8gb 3200
Re: Security Team

Hey everyone its been a while!
I had a rockin christman(got the new blackberry storm) and was off to drivers ed the next day. I dont even have time to breath anymore haha.
So i was catching up on the posts here.

SIW2,
i think it misses some things though. More then a scanner should. If it works for you though, you should deffinatly. That was just my personal opinion.

Norm+Chappy,
Great posts as always. Such an honor to have you two on the team here. Huge heps and great info.

And dmex,
Amazing stuff man. I wouldnt know how to do that at all! Care to shine in a little on how you did that?

Thansk ya'll and im glad to finally be back,
B-E-N

(haha new way to put my nam, haha, i know im four haha)
 

My Computer

System One

  • Manufacturer/Model
    Dell
    CPU
    Intel(R) Celeron(R) CPU 420 @1.60 GHz
    Motherboard
    Dell Inspion 530 Default
    Memory
    PNY 4GB 240-Pin SDRAM DDR2 800 (PC2 6400) Dual Channel
    Graphics card(s)
    ATI Radeon HD 2400 PRO
    Sound Card
    Realtek HD Audio
    Monitor(s) Displays
    Gateway PnP Monitor
    Screen Resolution
    1024x768 @ 75 Hz
    Hard Drives
    Seagate 250G ATA SATA-II
    Case
    Dell Inspiron 530
    Cooling
    None
    Mouse
    Logitech EX100 Combo
    Keyboard
    Logitech EX100 Combo
    Internet Speed
    100 MB/s
Back
Top