{"id":664,"date":"2010-12-28T15:15:15","date_gmt":"2010-12-28T20:15:15","guid":{"rendered":"http:\/\/it.thelibrarie.com\/weblog\/?p=664"},"modified":"2011-01-03T09:08:38","modified_gmt":"2011-01-03T14:08:38","slug":"exploit-testing","status":"publish","type":"post","link":"https:\/\/it.thelibrarie.com\/weblog\/2010\/12\/exploit-testing\/","title":{"rendered":"Exploit Testing"},"content":{"rendered":"<p>The last few weeks of the year are usually the best to start testing systems at my current job.  We currently have the following security measures in place:<\/p>\n<blockquote><p>Cisco Firewalls<br \/>\nJuniper Firewalls<br \/>\nCisco IPS<br \/>\nCisco Switches with ACLs on each VLAN<br \/>\nSecured Syslog Server<br \/>\nSecured Snort (IDS) Server<br \/>\nMcAfee Antivirus<br \/>\nWindows Updates*<\/p><\/blockquote>\n<p>*Windows Updates are not forced on the Dev Team or Server Farms &#8211; Those updates are installed manually usually once a quarter (after testing).<\/p>\n<p>Seeing as it&#8217;s Tuesday December 28th, I had some free time to test out the Antivirus installed on each system.  Most exploits today are not actually against the OS (Microsoft has done a pretty decent job lately with security issues, even with that huge DLL issue) and are instead targeting 3rd party applications.<\/p>\n<p>What do you consider a 3rd party application?  The biggest two are:<\/p>\n<blockquote><p>Adobe (PDF Reader, Flash Player)<br \/>\nSun (Java)<\/p><\/blockquote>\n<p>So I decided to test in my VMWare environment using the latest and greatest updates for Windows XP.  Why did I choose XP over 7?  Looking over my log files I see that most visitors to my site include XP users.  XP has also been around long enough to get all the kinks worked out.  And finally, I chose to use PDF\/Java exploits, so the OS doesn&#8217;t really matter as much.<\/p>\n<p>Please don&#8217;t visit these websites unless you know what you&#8217;re doing.  And I used smartscan\/quickscan whenever possible.<\/p>\n<p><strong>Test 1 (Nod32\/Threatfire):<\/strong><\/p>\n<blockquote><p>Windows XP Pro SP3<br \/>\nFully Updated 12.28.2010<br \/>\nInternet Explorer 8.0.6001.18702<br \/>\nNod32 Antivirus 4.2.67.10 5739<br \/>\nThreatfire 4.7.0.17<br \/>\nSecunia PSI 2.0.0.1002 100%<br \/>\nAdobe Flash Player 10 ActiveX 10.1.102.64<br \/>\nJava 6 Update 23 6.0.230<br \/>\nMalwarebytes Anti-Malware 1.50.1.1100 5408<\/p>\n<p>cryyahoo.info\/tre\/boba.exe<br \/>\n<em>Blocked by Nod &#8211; Downloaded Java (c:\\doc and set\\Administratorupdate665744669.exe) **PDF\/Java\/Trojan**<\/em><\/p>\n<p>expa82.co.cc\/bl2\/<br \/>\n<em>Blocked by Nod **Trojan**<\/em><\/p>\n<p>1.oresmir.co.cc\/1\/load.php?spl=mdac<br \/>\n<em>IE labeled download as unsafe, Cleaned by Nod **Trojan**<\/em><\/p>\n<p>marinada3.com\/77\/throatnut.php<br \/>\n<em>Blocked by IE &#8211; Java exploit blocked by Nod (Freezes IE) **Java\/Trojan**<\/em><\/p>\n<p><strong>Malwarebytes:<\/strong><br \/>\nObjects infected: 3 (3 are non-infection related)<\/p>\n<p><strong>Verdict:<\/strong><br \/>\nClean system, difficult to infect on accident.<br \/>\nPerformed scan by Nod32\/Threatfire &#8211; nothing found.<br \/>\n<a href=\"http:\/\/it.thelibrarie.com\/weblog\/wp-content\/uploads\/2010\/12\/nod32_threatfire.png\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/it.thelibrarie.com\/weblog\/wp-content\/uploads\/2010\/12\/nod32_threatfire-300x27.png\" alt=\"\" title=\"nod32_threatfire\" width=\"300\" height=\"27\" class=\"alignnone size-medium wp-image-665\" srcset=\"https:\/\/it.thelibrarie.com\/weblog\/wp-content\/uploads\/2010\/12\/nod32_threatfire-300x27.png 300w, https:\/\/it.thelibrarie.com\/weblog\/wp-content\/uploads\/2010\/12\/nod32_threatfire.png 723w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p><\/blockquote>\n<p><strong>Test 2 (McAfee):<\/strong><\/p>\n<blockquote><p>Windows XP Pro SP3<br \/>\nFully Updated 12.28.2010<br \/>\nInternet Explorer 8.0.6001.18702<br \/>\nMcAfee VirusScan Enterprise 8.7i 6210.0000<br \/>\nAdobe Flash Player 10 ActiveX 10.1.102.64<br \/>\nJava 6 Update 23 6.0.230<br \/>\nMalwarebytes Anti-Malware 1.50.1.1100 5408<\/p>\n<p>cryyahoo.info\/tre\/boba.exe<br \/>\n<em>Allowed to download &#8211; no extra processes<\/em><\/p>\n<p>expa82.co.cc\/bl2\/<br \/>\n<em>Allowed to load page &#8211; no extra processes<\/em><\/p>\n<p>1.oresmir.co.cc\/1\/load.php?spl=mdac<br \/>\n<em>IE labeled download as unsafe, allowed to install (load.exe, csrss in temp folder)<\/em><\/p>\n<p>marinada3.com\/77\/throatnut.php<br \/>\n<em>Blocked by IE &#8211; no extra processes<\/em><\/p>\n<p><strong>Malwarebytes:<\/strong><br \/>\nObjects infected: 14 (3 are non-infection related)<\/p>\n<p><strong>Verdict:<\/strong><br \/>\nCSRSS.EXE running as SYSTEM and Administrator.  Infected system.<br \/>\nPerformed scan by McAfee &#8211; nothing found.<br \/>\n<a href=\"http:\/\/it.thelibrarie.com\/weblog\/wp-content\/uploads\/2010\/12\/mcafee.png\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/it.thelibrarie.com\/weblog\/wp-content\/uploads\/2010\/12\/mcafee-300x102.png\" alt=\"\" title=\"mcafee\" width=\"300\" height=\"102\" class=\"alignnone size-medium wp-image-666\" srcset=\"https:\/\/it.thelibrarie.com\/weblog\/wp-content\/uploads\/2010\/12\/mcafee-300x102.png 300w, https:\/\/it.thelibrarie.com\/weblog\/wp-content\/uploads\/2010\/12\/mcafee.png 700w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p><\/blockquote>\n<p><strong>Test 3 (McAfee\/Threatfire):<\/strong><\/p>\n<blockquote><p>Windows XP Pro SP3<br \/>\nFully Updated 12.28.2010<br \/>\nInternet Explorer 8.0.6001.18702<br \/>\nMcAfee VirusScan Enterprise 8.7i 6210.0000<br \/>\nThreatfire 4.7.0.17<br \/>\nAdobe Flash Player 10 ActiveX 10.1.102.64<br \/>\nJava 6 Update 23 6.0.230<br \/>\nMalwarebytes Anti-Malware 1.50.1.1100 5408<\/p>\n<p>cryyahoo.info\/tre\/boba.exe<br \/>\n<em>Allowed to load page &#8211; file would not download<\/em><\/p>\n<p>expa82.co.cc\/bl2\/<br \/>\n<em>Allowed to load page &#8211; no extra processes<\/em><\/p>\n<p>1.oresmir.co.cc\/1\/load.php?spl=mdac<br \/>\n<em>IE labeled download as unsafe, Threatfire detected and blocked the installation, then found and blocked load.exe<\/em><\/p>\n<p>marinada3.com\/77\/throatnut.php<br \/>\n<em>Blocked by IE &#8211; no extra processes<\/em><\/p>\n<p><strong>Malwarebytes:<\/strong><br \/>\nObjects infected: 4 (3 are non-infection related)<\/p>\n<p><strong>Verdict:<\/strong><br \/>\nOnly infection file was located as a temporary internet file download and was not referenced in the registry.  &#8220;Clean&#8221; system.<br \/>\nPerformed scan by McAfee and Threatfire &#8211; nothing found.<br \/>\n<a href=\"http:\/\/it.thelibrarie.com\/weblog\/wp-content\/uploads\/2010\/12\/mcafee_threatfire.png\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/it.thelibrarie.com\/weblog\/wp-content\/uploads\/2010\/12\/mcafee_threatfire-300x30.png\" alt=\"\" title=\"mcafee_threatfire\" width=\"300\" height=\"30\" class=\"alignnone size-medium wp-image-667\" srcset=\"https:\/\/it.thelibrarie.com\/weblog\/wp-content\/uploads\/2010\/12\/mcafee_threatfire-300x30.png 300w, https:\/\/it.thelibrarie.com\/weblog\/wp-content\/uploads\/2010\/12\/mcafee_threatfire.png 724w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p><\/blockquote>\n<p><strong>Test 4 (Nod32):<\/strong><\/p>\n<blockquote><p>Windows XP Pro SP3<br \/>\nFully Updated 12.28.2010<br \/>\nInternet Explorer 8.0.6001.18702<br \/>\nNod32 Antivirus 4.2.67.10 5739<br \/>\nAdobe Flash Player 10 ActiveX 10.1.102.64<br \/>\nJava 6 Update 23 6.0.230<br \/>\nMalwarebytes Anti-Malware 1.50.1.1100 5408<\/p>\n<p>cryyahoo.info\/tre\/boba.exe<br \/>\n<em>Blocked by Nod<\/em><\/p>\n<p>expa82.co.cc\/bl2\/<br \/>\n<em>Blocked by Nod<\/em><\/p>\n<p>1.oresmir.co.cc\/1\/load.php?spl=mdac<br \/>\n<em>IE labeled download as unsafe &#8211; Not found by Nod32<\/em><\/p>\n<p>marinada3.com\/77\/throatnut.php<br \/>\n<em>Blocked by IE &#8211; Java exploit blocked by Nod32<\/em><\/p>\n<p><strong>Malwarebytes:<\/strong><br \/>\nObjects infected: 13 (3 are non-infection related)<\/p>\n<p><strong>Verdict:<\/strong><br \/>\nInfected system, somewhat hard to infect on accident, but a definite possibility.  CSRSS.exe is loading.<br \/>\nPerformed scan by Nod32 &#8211; nothing found.<br \/>\n<a href=\"http:\/\/it.thelibrarie.com\/weblog\/wp-content\/uploads\/2010\/12\/nod32.png\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/it.thelibrarie.com\/weblog\/wp-content\/uploads\/2010\/12\/nod32-300x99.png\" alt=\"\" title=\"nod32\" width=\"300\" height=\"99\" class=\"alignnone size-medium wp-image-672\" srcset=\"https:\/\/it.thelibrarie.com\/weblog\/wp-content\/uploads\/2010\/12\/nod32-300x99.png 300w, https:\/\/it.thelibrarie.com\/weblog\/wp-content\/uploads\/2010\/12\/nod32.png 699w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a>\n<\/p><\/blockquote>\n<p><strong>Test 5 (No AV):<\/strong><\/p>\n<blockquote><p>Windows XP Pro SP3<br \/>\nFully Updated 12.28.2010<br \/>\nInternet Explorer 8.0.6001.18702<br \/>\nAdobe Flash Player 10 ActiveX 10.1.102.64<br \/>\nJava 6 Update 23 6.0.230<br \/>\nMalwarebytes Anti-Malware 1.50.1.1100 5408<\/p>\n<p>cryyahoo.info\/tre\/boba.exe<br \/>\n<em>IE reported this site as BAD &#8211; File not found to download<\/em><\/p>\n<p>expa82.co.cc\/bl2\/<br \/>\n<em>Site loaded fine &#8211; no extra processes<\/em><\/p>\n<p>1.oresmir.co.cc\/1\/load.php?spl=mdac<br \/>\n<em>IE labeled download as unsafe &#8211; Saved and run successfully<\/em><\/p>\n<p>marinada3.com\/77\/throatnut.php<br \/>\n<em>Blocked by IE &#8211; Java exploit allowed to load &#8211; no additional processes<\/em><\/p>\n<p><strong>Malwarebytes:<\/strong> (google searches redirected to other websites, had to kill load.exe)<br \/>\nObjects infected: 14 (3 are non-infection related)<\/p>\n<p><strong>Verdict:<\/strong><br \/>\nIt&#8217;s always better to have some sort of antivirus software installed.  So I can&#8217;t recommend this at all.<br \/>\n<a href=\"http:\/\/it.thelibrarie.com\/weblog\/wp-content\/uploads\/2010\/12\/noav.png\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/it.thelibrarie.com\/weblog\/wp-content\/uploads\/2010\/12\/noav-300x106.png\" alt=\"\" title=\"noav\" width=\"300\" height=\"106\" class=\"alignnone size-medium wp-image-675\" srcset=\"https:\/\/it.thelibrarie.com\/weblog\/wp-content\/uploads\/2010\/12\/noav-300x106.png 300w, https:\/\/it.thelibrarie.com\/weblog\/wp-content\/uploads\/2010\/12\/noav.png 699w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a>\n<\/p><\/blockquote>\n<p><strong>Test 6 (Microsoft Security Essentials MSE):<\/strong><\/p>\n<blockquote><p>Windows XP Pro SP3<br \/>\nFully Updated 12.28.2010<br \/>\nInternet Explorer 8.0.6001.18702<br \/>\nAdobe Flash Player 10 ActiveX 10.1.102.64<br \/>\nJava 6 Update 23 6.0.230<br \/>\nMalwarebytes Anti-Malware 1.50.1.1100 5408<\/p>\n<p>cryyahoo.info\/tre\/boba.exe<br \/>\n<em>IE reported this site as BAD &#8211; File not found to download<\/em><\/p>\n<p>expa82.co.cc\/bl2\/<br \/>\n<em>Site loaded fine &#8211; no extra processes<\/em><\/p>\n<p>1.oresmir.co.cc\/1\/load.php?spl=mdac<br \/>\n<em>IE labeled download as unsafe &#8211; Saved and run successfully<\/em><\/p>\n<p>marinada3.com\/77\/throatnut.php<br \/>\n<em>Blocked by IE &#8211; Java exploit allowed to load &#8211; no additional processes<\/em><\/p>\n<p>MSE found a few files it needed to send in for verification, but did not block anything.<\/p>\n<p><strong>Malwarebytes:<\/strong><br \/>\nObjects infected: 12 (3 are non-infection related)<\/p>\n<p><strong>Verdict:<\/strong><br \/>\nMSE didn&#8217;t actively block anything &#8211; it only found the files when I scanned the computer using MSE.  I prefer a more active participant.<br \/>\n<a href=\"http:\/\/it.thelibrarie.com\/weblog\/wp-content\/uploads\/2010\/12\/mse.png\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/it.thelibrarie.com\/weblog\/wp-content\/uploads\/2010\/12\/mse-300x90.png\" alt=\"\" title=\"mse\" width=\"300\" height=\"90\" class=\"alignnone size-medium wp-image-678\" srcset=\"https:\/\/it.thelibrarie.com\/weblog\/wp-content\/uploads\/2010\/12\/mse-300x90.png 300w, https:\/\/it.thelibrarie.com\/weblog\/wp-content\/uploads\/2010\/12\/mse.png 699w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a>\n<\/p><\/blockquote>\n<p><strong>Test 7 (Microsoft Security Essentials MSE with TF):<\/strong><\/p>\n<blockquote><p>Windows XP Pro SP3<br \/>\nFully Updated 12.28.2010<br \/>\nInternet Explorer 8.0.6001.18702<br \/>\nAdobe Flash Player 10 ActiveX 10.1.102.64<br \/>\nJava 6 Update 23 6.0.230<br \/>\nMalwarebytes Anti-Malware 1.50.1.1100 5408<br \/>\nThreatfire 4.7.0.17<\/p>\n<p>cryyahoo.info\/tre\/boba.exe<br \/>\n<em>IE reported this site as BAD &#8211; File not found to download<\/em><\/p>\n<p>expa82.co.cc\/bl2\/<br \/>\n<em>Site loaded fine &#8211; no extra processes<\/em><\/p>\n<p>1.oresmir.co.cc\/1\/load.php?spl=mdac<br \/>\n<em>IE labeled download as unsafe &#8211; Threatfire blocked the installation<\/em><\/p>\n<p>marinada3.com\/77\/throatnut.php<br \/>\n<em>Blocked by IE &#8211; Threatfire blocked the java exploit from running<\/em><\/p>\n<p>MSE, like in the previous test, did not block anything.<\/p>\n<p><strong>Malwarebytes:<\/strong><br \/>\nObjects infected: 3 (3 are non-infection related)<\/p>\n<p><strong>Verdict:<\/strong><br \/>\nMSE didn&#8217;t actively block anything &#8211; it only worked well with TF in finding new problem programs.  I still prefer a more active participant, but MSE and TF worked well.<br \/>\n<a href=\"http:\/\/it.thelibrarie.com\/weblog\/wp-content\/uploads\/2010\/12\/mse_threatfire.png\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/it.thelibrarie.com\/weblog\/wp-content\/uploads\/2010\/12\/mse_threatfire-300x29.png\" alt=\"\" title=\"mse_threatfire\" width=\"300\" height=\"29\" class=\"alignnone size-medium wp-image-679\" srcset=\"https:\/\/it.thelibrarie.com\/weblog\/wp-content\/uploads\/2010\/12\/mse_threatfire-300x29.png 300w, https:\/\/it.thelibrarie.com\/weblog\/wp-content\/uploads\/2010\/12\/mse_threatfire.png 695w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a>\n<\/p><\/blockquote>\n<p><strong>Final Results:<\/strong><br \/>\nSo it appears as though Threatfire really does help out.  It also appears that Nod32 is only slightly better than McAfee and MSE edged them both out.  McAfee did not find the infections on access or during a scan.  Nod32 blocked only one file on access, but found nothing during a scan.  MSE blocked nothing during on access, but found a couple files with issues during a scan.<br \/>\nI also realize that I didn&#8217;t include Adobe Reader as part of the package.  Since I&#8217;ve already disposed of the virtual machines I don&#8217;t think I&#8217;ll go back and correct this error.<\/p>\n<p>No AV &#8211; 11 infections<br \/>\nMcAfee &#8211; 11 infections<br \/>\nNod32 &#8211; 10 infections<br \/>\nMSE &#8211; 9 infections<br \/>\nMcAfee with Threatfire &#8211; 1 infection<br \/>\nNod32 with Threatfire &#8211; 0 infections<br \/>\nMSE with Threatfire &#8211; 0 infections<\/p>\n<p>Final recommendation:<br \/>\nWhile I will continue to use Nod32 alongside Threatfire (I pay for the Nod32 subscription), and will continue to recommend it to my peers\/clients, I must say that for the average home user MSE has come through with flying colors.  However, when utilizing MSE you MUST scan your system after each download or on regular scanning intervals.  Their lack of on-access scanning is my major gripe at this time.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The last few weeks of the year are usually the best to start testing systems at my current job. We currently have the following security measures in place: Cisco Firewalls Juniper Firewalls Cisco IPS Cisco Switches with ACLs on each VLAN Secured Syslog Server Secured Snort (IDS) Server McAfee Antivirus Windows Updates* *Windows Updates are &hellip; <a href=\"https:\/\/it.thelibrarie.com\/weblog\/2010\/12\/exploit-testing\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Exploit Testing<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[],"class_list":["post-664","post","type-post","status-publish","format-standard","hentry","category-microsoft"],"_links":{"self":[{"href":"https:\/\/it.thelibrarie.com\/weblog\/wp-json\/wp\/v2\/posts\/664","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/it.thelibrarie.com\/weblog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/it.thelibrarie.com\/weblog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/it.thelibrarie.com\/weblog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/it.thelibrarie.com\/weblog\/wp-json\/wp\/v2\/comments?post=664"}],"version-history":[{"count":9,"href":"https:\/\/it.thelibrarie.com\/weblog\/wp-json\/wp\/v2\/posts\/664\/revisions"}],"predecessor-version":[{"id":669,"href":"https:\/\/it.thelibrarie.com\/weblog\/wp-json\/wp\/v2\/posts\/664\/revisions\/669"}],"wp:attachment":[{"href":"https:\/\/it.thelibrarie.com\/weblog\/wp-json\/wp\/v2\/media?parent=664"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/it.thelibrarie.com\/weblog\/wp-json\/wp\/v2\/categories?post=664"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/it.thelibrarie.com\/weblog\/wp-json\/wp\/v2\/tags?post=664"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}