Malwarebytes Anti-Exploit is your effective protection against exploits. Exploit protection for Windows users Strong exploit protection

Exploit Guard is a new Windows security feature that was first introduced by Microsoft in the Windows 10 Fall Creators Update.

Exploit protection is provided by an integrated version of the Microsoft EMET (Enhanced Mitigation Experience Toolkit), which is expected to be completed in mid-2018.

Anti-spill protection is due to Windows Defender enabled. This function is a single function of Exploit Guard, but does not require additional protection in real-time mode.

This feature can be configured in the Windows Protection Security Center, using group policies or PowerShell commands.

Windows Defender Security Center

Windows 10 users can set up exploit protection in the Windows Defender Security Center.

  1. Use the Windows key + I to launch the “Options” program.
  2. Go to “Updates and Security”, and then select “Windows Security”.
  3. Press button Open Windows Defender Security Center.
  4. Select the “Current Programs and Browser” panel.
  5. On the page that appeared, select the message Protection parameters for exploits.

All settings are divided into two categories: System parametersі Program parameters.

On deposit System parameters A list of all available protection mechanisms is displayed depending on their status. The Windows 10 Fall Creators Update has the following protections available:

  • Control flow control (CFG) – uvmk. for getting ready.
  • Data storage (DEP) - uvіmk. for getting ready.
  • Primus vipadkovy rospodіv (obov'yazkovy ASLR) - vimk. for getting ready.
  • High-definition video memory (low ASLR) - on. for getting ready.
  • Check the pins of the screws (SEHOP) - uvіmk. for getting ready.
  • Check the integrity of the purchase – incl. for getting ready.

Program parameters Give you the ability to customize protection for a variety of programs and add-ons. This option works similarly to the disable function in Microsoft EMET for song programs. This possibility will be especially problematic, since the program will work silently when the song module is turned on.

For the promotion of a number of programs, please contact Vynyatka, including svchost.exe, spools.exe, runtimebroker.exe, iexplore.exe and other main Windows programs. Please note that you can re-evaluate the errors by selecting the file and clicking the “Edit” button.

You can set the final status of all skin care products that you have added to your program. In addition to reassigning the system parameter for switching on or off, it is possible to set the parameter only for auditing. In the remaining case, there will be a record of the data that was recorded, as well as the status of the protection of the notifications, in the Windows system log.

The "Program Options" list lists additional protection parameters that cannot be adjusted under system parameters, but some have been adjusted for work other than programs.

Among them:

  • Protection against a valid code (ACG)
  • Blocking low-strength images
  • Blocking distant images
  • Blocking untrusted fonts
  • Code integrity protection
  • Vimknennya expansion point
  • Win32k system calls
  • Do not allow child processes
  • Export address filtering (EAF)
  • Import Address Filtering (IAF)
  • Simulation of Vikonanny (SimExec)
  • Checking API calls (CallerCheck)
  • Verifying the vikoristanny descriptor
  • Checking the integrity of image deposits
  • Checking the integrity of the stack (StackPivot)

PowerShell

You can use the PowerShell command line to install, delete, or change the list of entries. The following commands are available:

To look at all the latest entries in the process: Get-ProcessMitigation -Name processName.exe

To set a dry entry: Set-ProcessMitigation - - ,

Area: -System or -Name.

Action: either -Enable or -Disable.

Mira: the name of a dry world. Go back to the table on the Microsoft website to view the list of available entries. You can increase the number of times you go.

  • Set-Processmitigation -System -Enable DEP
  • Set-Processmitigation -Name test.exe -Remove -Disable DEP
  • Set-ProcessMitigation -Name processName.exe -Enable EnableExportAddressFilterPlus -EAFModules dllName1.dll, dllName2.dll

Import and export of configurations

Configurations can be imported and exported. These operations can be performed on the “Exploit Protection Settings” page of the Windows Defender Security Center, as well as using PowerShell or the Group Policy Editor.

In addition, EMET configurations can be converted for further import.

Vikoristannya tuning protection from exploits

You can export configurations from Windows Security Center rather than import them. The export includes all entries of the system level and program level.

PowerShell wiki for exporting configuration file

  1. Run the command: Get-ProcessMitigation -RegistryConfigFilePath filename.xml

PowerShell wiki for importing a configuration file

  1. Open Powershell with device administrator rights.
  2. Run the command: Set-ProcessMitigation -PolicyFilePath filename.xml

Vikoristana group policies for installing a configuration file

You can install configuration files using the Group Policy Editor:

  1. Press the Windows key, enter gpedit.msc And select the object that represents the Windows search service.
  2. Go to Computer Configuration > Administrative Templates > Windows Components > Windows Security Exploit Guard > Exploit Guard.
  3. Select the policy “Victorize the hidden dial for protection from exploits.”
  4. Select “Disabled”.
  5. Add paths and names to the XML configuration file in the “Parameters” field.

Reworking the EMET file

  1. Open Powershell with device administrator rights.
  2. Run the command: ConvertTo-ProcessMitigationPolicy -EMETFilePath emetFile.xml -OutputFilePath filename.xml

Change emetFile.xml on the way and expand the EMET configuration file.

Change the path and filename.xml, indicating the necessary modification of the file name.

Did you know Drukar's mercy? See and click Ctrl+Enter

The number of destructive viruses tripled over the past river, and the number of ransoms increased by 266% and the world average was 1000 dollars per victim.

YakovGrodzensky, kerivnik direct to IB "System Software"

The use of terminal devices, including mobile phones, has increased across businesses over the past decade. This growth is evident in the oppressive landscape of threats: Call Symantec Today there are over a million virus infections around the world. For example, the number of malicious viruses tripled over the past year, and the number of ransoms increased by 266% and the world average was 1000 dollars per victim.

It seems that the task of cybersecurity for endpoints today has become titanic and can hardly be implemented manually or with the help of an antivirus.

It’s effective, Gartner analysts indicate a stable trend of increased protection of end devices, including the creation of white and black lists of programs, nodes and programs and other control tools as part of the overall protection cycle. What does it mean to guarantee the security of business and truly eliminate the lack of good old antiviruses?

Let's try to get back together.

What is Endpoint Security for the company and the market?

What is the mature strategy for protecting end devices, such as devices, connecting to your corporate network, essentially the “door” to valuable personal and business data?

Let us first understand that IB administration is more complex, and the end devices are an element of the IT (that is, IB) infrastructure and differentiate where its protection ends and protection begins, at butt, measures, actually clumsy and stupid.

Administrative policies and the security protocol itself may undermine the protection of all elements of the IT infrastructure. And the current network connects a wide range of end devices, including PCs, laptops, smartphones, tablets, POS terminals... and such devices can provide access to the network. This means that this cybersecurity specialist has a minimum of automation. Moreover, the existing endpoint security policy to address the growing threats today requires vikorystvovayutsya as a minimum:

  1. firewalls for various types of devices;
  2. antivirus for electronic mail;
  3. monitoring, filtering and protection of web traffic;
  4. security management and safety solutions for mobile devices;
  5. control of robotic accessories;
  6. data encryption;
  7. create an invasion.

In this case, the market offers three main solutions to the protection of end devices and their combinations:

1. Traditional antiviruses that are based on signatures. They give a stable result - but only within the framework of the signatures. Due to the incredibly large number of corrupted images, it is not possible for you to be 100% up to date at any given time, plus you can enable the antivirus on your machine.
2. Endpoint Detection and Response (EDR) or detection and response to incidents. Such solutions, for example, KEDR from Kaspersky Lab, are recognized by indicators. compromise on the terminal device and block and/or rejoice yogo. Consider these systems to work only behind the fact of evil (intrusion) at the device or corporate level.
3. Advanced Endpoint Protection (AEP) or advanced protection of end devices, which includes preventive methods of protection from exploits and malicious software, control of devices and ports, personal firewalls, etc. This is why AEP decides to fight threats: the threat is recognized and reduced to an evil one, such as, for example, Palo Alto Networks Traps, Check Point SandBlast Agent (it decides to run backup copies when suspicious activities are detected) or Forticlient.

Regardless of which vendor or combination of services you have chosen, it is important to know the basic rules for evaluating such solutions and determining an effective cybersecurity strategy for the end devices at your disposal.

These are the basic rules of Endpoint-cyber defenses

First rule. Zakhist is guilty of zneshkodzhuvati all lanzyuzhok attacks.

According to analysts and representatives of the cybersecurity market, relying on “viruses and antiviruses” is a failed strategy for businesses that want to protect their business. Infection and the virus itself are just one hole in the richly long gap that leads to evil corporate measures.

And the attempt to invade your infrastructure begins. Apparently, an effective defense against invasion today is to take revenge:

  1. methods of careful verification of postal supplements (electronic mail, as before, leads as a “tool for delivering malware” on the customer’s device);
  2. How to protect against attracting unwanted programs from the Internet - 76% of sites are prone to unwanted spills. Here, technology will help that analyzes all incoming and outgoing traffic and implements browser protection to block such threats before running on the end device;
  3. careful protection of the terminal devices themselves, so that the service is controlled by both accessories and the device itself.
  1. analysis of the reputation of files and the identification of their key attributes (incremental growth of the file and the number of its influences). Ideally, the system monitors hundreds of messages and billions of connections between merchants, sites and files in order to prevent the expansion and mutation of malware and avoid attacks;
  2. inserted elements of machine technology. This is a truly working, signature-free technology that can analyze trillions of files from a global network, independently separate “good” files from “bad” ones, and block bad security programs until they are deployed;
  3. protection from exploits, especially zero-day attacks and memory read attacks;
  4. behavioral monitoring to identify “unsafe” behavior of scripts, add-ons, devices and nodes at the edge – and eliminate such threats;
  5. clear emulation, or the Swedish created a “sandbox” to detect and block the useless software on the device.

Friend rule. Endpoint Detection and Response (EDR) or investigation and response to incidents are responsible for results.

The problem lies in the fact that 82% of today's cyber criminals for statistics These data show valuable business data for a fraction of the time or less, since 75% of companies do not respond to incidents of at least a few years. It’s such a shame to talk about the truth of high risks in the safety zone of terminal structures.

Introduced EDR solutions can isolate your terminal device for effective investigation of the malicious virus, detect the spread of the virus and update the device through its uninfected copy of the data.

Rule of thirds. The system is not to blame for the business, but also:

a) Equally important is the productivity and scalability of your security systems. So your defense is not to blame for the delay in the efficiency of business processes and the rapid exchange of data during the period. Plus, it is important to quickly activate the cybersecurity system at new workplaces, for example, at a regional or foreign branch.

b) The overall performance of the transfer and vicorization may be optimal.

Quarter rule. Cyber ​​security has been centralized. Sectioned, hand-carved from different points, the decision is made to increase the number of compromises, excessive notifications and untruthful requests, without even mentioning the claims of time and financial costs for the administrator bath for the “zoo”.

Rule p'yate. Seamless integration with software and hardware solutions on a skin-to-skin basis for the efficient operation of the entire Internet Security infrastructure, including the protection of gateways to SIEM systems. It is important that endpoint security solutions be integrated with Network Access Control (NAC) so that the computer can be isolated to the fullest extent. It is also important that Endpoint products work in conjunction with IB gateway solutions that support deep packet analysis and inspection of SSL traffic.

Shoste rule. Covering all possible operating systems, including servers and mobiles - remember the abundance of “miscellaneous” devices that computers bring with them or choose for work in the office.

Syome rule. Posileniy zakhist danikh. At this point, do not get caught up in the protection of end devices, otherwise, without it, it is in principle impossible to develop an effective IB strategy. These data include:

  1. encryption;
  2. segregation (subdivision) of plots and nodes in the border, groups of farmers near the border;
  3. protection from wasting data; features of renewal;
  4. monitoring the integrity of files and the file system.

… and three additional

Perche. Particular attention is paid to the elimination of cyber threats on mobile devices. BYOD/CYOD/COPE concepts are becoming less popular, and the number of mobile devices in corporate settings is still growing.
They require special respect, even if such devices are used not only for work and not only in the office, but also, the risk of infection of corporate networks through them is even high.

Ideally, the strategy of “mobile IT management” can:

  1. mobile VPS;
  2. enhanced authentication of devices from the corporate network;
  3. control and monitoring of third-party content;
  4. containerization of additives.

Friend. Analysis of KPIs of maturity in the protection of terminal devices.

Forrester Research analysts classify five (or six) stages of maturity of an enterprise’s information security strategy:

Zero day of the day- There is no consumption, no understanding, no formalized benefits.

AdHoc is spontaneous- the need for cyber security varies from hour to hour, there is no planning of information security resources, processes are not documented.

Vimushena- intuitive, undocumented, unsystematic, based on demand.

I'm informed- processes are documented, the strategy itself is understood and transferred, and the assessment of actions and resources is carried out hourly.

Vivirena- clear management tools have been introduced, a high level of formalization and (often) automation of procedures, regular assessment of activities, processes and investments.

Optimized- processes and equal protection become automated, and the strategy itself is designed to ensure long-term, effective and projective protection of business. High level of integration of IB services and systems.

Apparently, it is cheaper and safer to proceed at the remaining three stages. With this gradation, it is also easier to set goals for enhancing your information security strategy if you are on the first three.

Third. And hopefully, your users of end devices will know what a cyber defense is, and will gradually increase their knowledge and skills. The most important official is a human one, and without competent personnel there is a strong chance of being a failure. No one has learned how to withstand the human factor without harming operational work. It’s easier and much cheaper to teach people the basics of safe behavior and use their gadgets.

The replacement of traditional signature antiviruses, as before, is more relevant. Old viruses, Trojans and other types of harmful programs have not been shared anywhere. This antivirus is not enough to protect against new exploits, so-called “zero-day” threats. These malware have not been seen before, and they have no signatures. a cost-free version of Malwarebytes Anti-Exploit Premium. The tool is easy to resist exploits and does not require any malicious signatures.

Browser protector

The cost-free version is protected from Chrome, Firefox, Internet Explorer and Opera. Anti-Exploit protects not only the browser itself, but also plugins and additional ones, as well as the Java middleware. By purchasing the Premium version for $24.95 RUR, you will not have access to Microsoft Office documents, PDF viewers, and media players.

In the paid version, users can enable and disable protection for certain programs, as well as disable shields. Adjustment of the no-cost version is fixed, the protection is expanded by only 5 programs, no more and no less.

Everything is working!

The exploit targets a specific version of the victim program and cannot be used with other versions. This fact brings advances to the minds of testing. Malwarebytes will not respond to the exploit because it does not have the potential to cause harm. Malwarebytes took part in the tests of the famous blogger Kafeine. In their tests, they found 11 of the most advanced exploits, and the program successfully blocked all of them.

To conduct official independent tests, computer security expert Neil J. Rubenking went to the MRG-Effitas laboratory. The technical director of the organization kindly provided a collection of exploits stored by Fiddler Web Debugger. The test system was carefully adjusted, the correct versions of the program were installed, after which attacks began to be detected. The Malwarebytes product successfully blocked absolutely all threats.

Kafeine has published a list of sites that have been corrupted by exploits, including the resource of a great retailer. A handful of sites on the list have already been corrected, and many others are permanently blocked by Malwarebytes.

Try Varto

Malwarebytes Anti-Exploit Free does not clog the edge data transmission channel, and the update takes up only 3 megabytes on the disk. The program has wonderful additions to your collection of additional protection utilities. If you do not mark program activity, the exploit will not be blocked. For users who are particularly susceptible to web attacks, implementing browser protection may be sufficient. If you also need protection from MS Office and PDF documents, as well as protection from direct attacks that are targeted, you should consider checking out Malwarebytes Anti-Exploit Premium.

A look at Malwarebytes Anti-Exploit Free:

Advantages

  • protects browsers and Java middleware from exploits;
  • The robot does not require signatures;
  • the program is small and resource-intensive;
  • The Premium version includes the protection of Microsoft Office documents, programs for viewing PDF files and media players;
  • The effectiveness of the product is confirmed by tests;
  • I will introduce a cost-free product.

Nedoliky

  • it is difficult to assess effectiveness.

Zagalna assessment

Malwarebytes Anti-Exploit Free protects your browsers against attacks from popular exploits and new zero-day threats. Try this completely cost-free additional safety tool.

This fall, Windows 10 was updated to version 1709, code-named Fall Creators Update or Redstone 3. In the midst of many changes, we were immediately focused on reducing the protection against unknown malware. Microsoft has implemented low-level approaches to counter encryption Trojans and exploits. To what extent were the stinks successful?

Old new zahisnik

Everything is new - not the good rebranded old. In the “Fall Update for Designers,” the protection components were introduced into the Windows Defender Security Center. The software firewall will now be called “Windows Firewall Firewall”, but the changes are purely cosmetic. More importantly, there are new functions, which we will look at below.

Another old new component coming to Redstone 3 is called Exploit Defense. Windows Defender Exploit Guard, or simply EG, is turned on through the “Windows Security Center” under the “Current programs and browser” section.

Technically, Exploit Guard is a powerful Enhanced Mitigation Experience Toolkit with a set of low-virus features and a new interface. EMET appeared within hours of Windows Vista, now its support has been added, and Exploit Guard has taken its place. You should be concerned with the Advanced Threat Protection features, such as the Device Guard device manager that you connect to, and the Application Guard add-on manager. You can tell that Microsoft initially wanted to reveal the hidden component of Advanced System Security Guard, but the acronym turned out to be completely dissonant.

Exploit protection

Exploit Guard is merely a risk reduction tool; it does not eliminate the need to close spills in software, but rather complicates their recovery. The main principle of Exploit Guard is to protect those operations that are most often abused by crooks.

The problem is that there are a lot of legitimate programs that are also vikorists. Moreover, old programs (or more precisely dynamic libraries) simply stop working when new memory control functions and other daily protection features are enabled in Windows.

Therefore, the setup of Exploit Guard is the same as that previously used by EMET. In my memory, a lot of administrators spent months delving into subtle adjustments, and then simply carried out vikoryist intermediary functions through the numerous skunks of the koristuvachs.

If you need to be careful and need to tighten the nuts tighter, the most popular Exploit Guard features (including EMET) will be lost:

  • DEP(Data Execution Prevention) – protection of data. Does not allow you to run a piece of code on your account that is not intended for that memory area (for example, as a result of a stack overflow);
  • convulsive regeneration of memory- avoids attacks against known addresses;
  • connection point extension- it overrides the DLL in the process that is being launched (chapter about bypassing UAC, this method has been widely abused);
  • team AllowedChildProcessCreation- prevents the designated additive from creating child processes;
  • Filtering table address for import (IAF) and export (EAF)- does not allow the (scrappy) process to open the address table and expand to the memory side of the system libraries;
  • CallerCheck- checks the availability of rights to click on confidential APIs;
  • SimExec- Imitation of Viconn. It checks the code before the real Wikonian to whom to turn the confidential API calls.

Commands can be sent via PowerShell. For example, the barrier for creating child processes looks like this:

Set-ProcessMitigation -Name wiki_file.exe -Enable DisallowChildProcessCreation

All x86 processors and chipsets of the remaining ten releases support DEP on the hardware level, and for older ones, software implementation of this function is available. However, to ensure that new versions of Windows work well with older software, Microsoft still recommends turning on DEP in the “only for system processes” mode. For these reasons, it was impossible to enable DEP for any process. All this is done successfully in the techniques of bypassing the data storage system.

Therefore, the benefit of Exploit Guard will be advantageous due to the fact that it is possible to use only a few important functions without causing problems with the main programs. The truth rarely comes out. The axis is the EG profile, converted from EMET, which immediately calls out the name of Windows 10 from BSoD. If “Hackers” had a section “Intruder”, and Exploit Guard would fit in miraculously.

Extension is no longer available to participants

Option 1. Go to the “site” to read all the materials on the site

Membership with the entirety of the designated term will give you access to ALL Hacker materials, increase your personal savings and allow you to accumulate a professional Xakep Score rating!

Exploit protection (Exploit Guard) is a new feature in Windows Defender in Windows 10 1709, which is a consolidated and shorter version of Microsoft's EMET tool. Exploit Guard is designed to protect your computer from exploits and infection of your system with malicious programs. There is no need to specifically activate Exploit Protection, but it will be activated automatically, or even if Windows is disabled.

You can change Exploit Guard settings in Windows Defender Security Center.

In general, there are two main categories of changing the configuration on a computer. Let's take a look at the skin of their report.

Here you can see a list of available Windows protection mechanisms. Instruct the status to be indicated - disabled, disabled. Available:

  1. C.F.G. Protect the flow of keruvanny and ensure its integrity for the creation of indirect calls (involved in cleaning).
  2. SEHOP. Checking the lanyard wines and ensuring their integrity during the hour of delivery.
  3. DEP. Zabogannya vykonannyu danikh (for umovchannyam).
  4. Obov'yakovy ASLR. Primus vapadkovy distribution for images that do not correspond to /DYNAMICBASE (noted for washing).
  5. Low ASLR. Vypadkovyy division of vision memory. (taken to get dressed).
  6. Check the integrity of the purchase. Once a problem is detected, the process ends automatically. (taken to get dressed).

The koristuvach can pick them up one at a time.

In this section you can also edit additional protection parameters for the skin file and add them to the list of faults. If the software conflicts with any module activated in the system parameters, it can be disabled. In this case, the adjustment of other programs will become unchangeable.

This option works in the same way as when disabled in Microsoft's EMET tool. There are already several standard Windows programs running here.

You can add a new file to be added to the list right away by clicking on the “Add programs for individual customization” button. For this, please indicate the name of the program or the exact route to it. Please contact the list.

The doctor can edit the parameters of the skin irritation program. To do this, select from the list and click “Edit”, then press/increase the required option. You can delete the program from the list of faults.

There are only a few parameters available for editing, which cannot be adjusted through the “System” category. These options are set to “Audit”. After activation, Windows will record data in the system log, which is easy for further analysis.

Import and export adjustment

You can export detailed Exploit Guard settings through Windows Security Center. To do this, just click on the appropriate button and save the file in XML format.

You can export settings via the Windows PowerShell command line. For whom is the command:

Get-ProcessMitigation -RegistryConfigFilePath C:\Users\Alex\Desktop\Settings.xml

To import, you need to replace the cmdlet Get on Set And by analogy with the butt, enter the name of the path to the file.

You can install the existing XML file from the settings through the local group policy editor gpedit.msc:

  1. On the left side of the screen, go to the editor tab Computer Configuration -> Administrative Templates -> Windows Components -> Exploit Guard in Windows Security -> Exploit Protection. Open the Wikorist policy to protect against exploits.
  2. Change the value to “Notified”, and in the field that appears, enter the path to the URL to the original XML file with the configuration.

Save your changes by clicking “Save”. It’s very easy to adjust the order, so it’s not obligatory to re-engineer your computer.

Setting up Exploit Guard for additional PowerShell help

To edit the list of protection modules, you can use the Windows PowerShell command line.

The following commands are available here:

  1. Get-ProcessMitigation -Name iexplore.exe – retrieve a list of all successful calls for the selected process. Which application has iexplore.exe, you can specify something else. Instead of the program name, you can enter the exact path.
  2. Mill NOTSET(not installed) for the category of system parameters means that the values ​​for the settings are installed, for the category of programs here you should enter the parameter before which entry will be assigned to the control.
  3. Set with additional team ProcessMitigation Vikorist is used to edit the skin edema value. To activate SEHOP for a specific configured file (in our application test.exe) at the address C:\Users\Alex\Desktop\test.exe, use the PowerShell command: Set-ProcessMitigation -Name C:\Users\Alex\Desktop\test . exe -Enable SEHOP
  4. To set this entry for all files, and not for a specific program, use the following command: Set-Processmitigation -System -Enable SEHOP
  5. -Enable- keep quiet, - Disable- Vimknuti.
  6. Cmdlet - Remove Vikorist to update the standard settings and indicate immediately after - Name.
  7. -Enable or - Disable AuditDynamicCode- Activate or enable audit.

When entering commands, make sure that the skin and the parameter may become creamy when entering. You can admire their list right here, PowerShell. The stink appears after entering the command Get-ProcessMitigation -Name process_name.exe .