Haxxors use Facebook to help conceal malware
Posted: Wed Jun 07, 2017 1:14 am
NoScripters and WebSec nerds of all lands, unite!
https://forums.informaction.com/
Wow. If you could please explain what security measures you use for that stuff, it would be much appreciated!GµårÐïåñ wrote:I have been using a computer since 1986 and I have NEVER, EVER, had a virus, worm, trojan, or been compromised in any way and I do some crazy ass things like analyzing live virus code right on my daily driver production machine. It's like working at the CDC, you know the f-ing ebola test tube can kill you but you go in each day, handle it, then go have lunch and go home, no biggie. Why you ok? Because you handle it right, there are protocols, as long as people apply something similar to their activity, they will be fine.
These exact measures seem Windows-specific. I run Ubuntu, how much of this does using either firejail or Apparmor cover?GµårÐïåñ wrote:Lock down all your system files, simple DEP will handle that. If you are a masochist, you can try Comodo's HIPS but it is excessively confusing for most but it will have one advantage, when dealing with an app whose behavior you DON'T know, this will expose everything it does, and can provide you all the interactions which can help you diagnose if safe or not but I would NOT use their HIPS 24x7 that would be exhaustively counterproductive. When you do open a file or run it, make sure your "temp" or "scratch" folders are all isolated with ONLY SYSTEM and ADMIN user access, NO ONE ELSE, that way you will guarantee that no one can actually leverage them against you; and also make sure you are opening it (at least the first time) inside a sandbox. Some good ones are Sandboxie (free-ish) but be careful configuring it for convenience, you might just be letting the devil in without realizing it. Another open option which does pretty well is Comodo's sandbox which they are Auto-Containment, I don't have it auto, just manual through right click when I need it. Side note, the crippled folder I told you will be created for each file you open in this method by default, so there is that nice feature.
Question, do you use both because defense-in-depth, or because the functionality doesn't completely overlap?GµårÐïåñ wrote:I use uBlock, Disconnect,
You are very welcome.barbaz wrote:Many thanks for the detailed answer!
Yes, as that is my primary environment but I have countless flavors of Unix/Linux and Mac on tap as well, but they are strictly research, compatibility and debugging purposes and are run in completely isolation, they are basically cold boxes. So since I am doing what I am doing to them on purpose, I expect them to break as needed to serve that end, but when I am done, it gets zeroed and goes back to healthy state, so I don't really have to invest in much there, they behave quasi-live in nature.
neither entirely nor both but mostly for observational redundancy. Meaning, are they both seeing the same thing? If not, WHY? That's all. Sometimes I even employ external packet monitor to validate connections. I forgot to add that the external monitor is to ensure that execution order of u+d is not causing a knockout effect between them. I assumed that was clear, but wanted to make sure.barbaz wrote:Question, do you use both because defense-in-depth, or because the functionality doesn't completely overlap?
Interesting. I never thought of symlinks and aliases that way before.GµårÐïåñ wrote:1) Watch your route tables, symlinks and aliases. If you spend any amount of time looking at these, which I am sure you have, you will know why.
Sounds like one reason why I use firejail and/or VM for some stuff.GµårÐïåñ wrote:2) Protect your system partition's access, in fact I highly recommend you keep everything on a custom data partition and micromanage the access to system counterparts using symlinks. But don't put it on there and give it direct access.