IDS mailing list archives
RE: IDS and Spywares
From: "Justin Shore" <justin.shore () sktbcs com>
Date: Sun, 16 Oct 2005 22:55:28 -0500
There is an extremely easy solution to this problem. Remove local administrative rights from users' PCs. There is absolutely no reason whatsoever for a user in a corporate environment to have local admin rights if they aren't actually a sysadm. In a home environment there is absolutely no reason for a user to be a local admin all the time. Remove this capability for the residential-grade OSs and make users utilize the Run As feature of XP and 2000. Better yet make this process automatic like in OS X. There is no reason in this day and age for users to need constant local admin access, if they need local admin access, period. Justin PS==> IIRC Network Magazine, Network Computing, or some other such magazine echoed this exact sentiment in the most recent issue when they tested a couple dozed xIDS implementations. 100% of their spyware compromises were directly caused by local admin access.
-----Original Message----- From: Matt Jonkman [mailto:matt () infotex com] Sent: Thursday, October 13, 2005 10:08 AM To: Omar A. Herrera Cc: focus-ids () securityfocus com; 'vipul kumra'; dhruv_ymca () yahoo com; neelabhsharma1 () gmail com Subject: RE: IDS and Spywares I strongly disagree that IDS is not effective with spyware. I grant that hids is a good thing. But maybe I'm from the old school of thought, that you can't trust any system to police itself. That system is corruptable, and thus needs outside oversight. Security 101. That is exemplified by the number of worms that kill AV on their victims, or alter hosts files so they can't get new dats, etc. The victim sits there warm and fuzzy because they paid the 40 dollar Symantec tax, and they're blasting spam to the world, none the wiser. The code to do these things is easil available, and surely will be used by spyware once they feel a hit to their pocketbook. If there's money to be made they'll do it. Matt On Wed, 2005-10-12 at 22:52 +0100, Omar A. Herrera wrote:-----Original Message----- From: vipul kumra [mailto:vikumar2 () yahoo com] Hi Dhruv, I agree with what you have said... but then there is no 100% fool proof method for detecting anything. As far as I've seen iPolicy Networks IDS protection is quite strong... :)Why use a hammer with a screw? Network based detection is able to deal pretty well with known network threats, but some sort of malware(includingsome Trojans and spyware) are customized or modified and used withspecifictargets. You won't detect those with generic signatures or network based anomaly behavior. hIDS/hIPS ar much more effective in detecting and preventing theseattacks.If there is any anomalous activity to be detected or any forbiddenaction tobe blocked, it will be host based, not network based. To start, there isaconsiderable number of ways that these threats can travel through the network (e.g. web scripts, P2P messaging, email attachments, trojanized downloaded software)and they might not even used the network to get totheirtarget (Sharing of USB memory sticks, CDs, DVDs,...) Personally I doubt that it is even worth trying to catch this kind of malware with a network based IDS or IPS. I would rather use the time for polishing hIPS/personal firewall policies. I think this is what Dhruv meant. Regards, Omar Herrera ------------------------------------------------------------------------ Test Your IDS Is your IDS deployed correctly? Find out quickly and easily by testing it with real-world attacks from CORE IMPACT. Go to http://www.securityfocus.com/sponsor/CoreSecurity_focus-ids_040708 to learn more. -------------------------------------------------------------------------- -------------------------------------------- Matthew Jonkman, CISSP Senior Security Engineer Infotex 765-429-0398 Direct Anytime 765-448-6847 Office 866-679-5177 24x7 NOC my.infotex.com www.offsitefilter.com www.bleedingsnort.com -------------------------------------------- NOTICE: The information contained in this email is confidential and intended solely for the intended recipient. Any use, distribution, transmittal or retransmittal of information contained in this email by persons who are not intended recipients may be a violation of law and is strictly prohibited. If you are not the intended recipient, please contact the sender and delete all copies. ------------------------------------------------------------------------ Test Your IDS Is your IDS deployed correctly? Find out quickly and easily by testing it with real-world attacks from CORE IMPACT. Go to http://www.securityfocus.com/sponsor/CoreSecurity_focus-ids_040708 to learn more. ------------------------------------------------------------------------ -- No virus found in this incoming message. Checked by AVG Anti-Virus. Version: 7.0.344 / Virus Database: 267.12.0/134 - Release Date: 10/14/2005
-- No virus found in this outgoing message. Checked by AVG Anti-Virus. Version: 7.0.344 / Virus Database: 267.12.1/136 - Release Date: 10/15/2005 ------------------------------------------------------------------------ Test Your IDS Is your IDS deployed correctly? Find out quickly and easily by testing it with real-world attacks from CORE IMPACT. Go to http://www.securityfocus.com/sponsor/CoreSecurity_focus-ids_040708 to learn more. ------------------------------------------------------------------------
Current thread:
- RE: IDS and Spywares, (continued)
- RE: IDS and Spywares Omar A. Herrera (Oct 13)
- RE: IDS and Spywares Matt Jonkman (Oct 14)
- RE: IDS and Spywares Omar A. Herrera (Oct 14)
- RE: IDS and Spywares Matt Jonkman (Oct 14)
- RE: IDS and Spywares Omar A. Herrera (Oct 14)
- RE: IDS and Spywares Frank Knobbe (Oct 18)
- RE: IDS and Spywares Omar Herrera (Oct 18)
- RE: IDS and Spywares Dhruv Soi (Oct 18)
- RE: IDS and Spywares Frank Knobbe (Oct 18)
- RE: IDS and Spywares Omar A. Herrera (Oct 18)
- RE: IDS and Spywares Omar A. Herrera (Oct 13)
- RE: IDS and Spywares Omar Herrera (Oct 18)
