Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Locked thread
Lain Iwakura
Aug 5, 2004

The body exists only to verify one's own existence.

Taco Defender

Geemer posted:

How do you trust your computer not to be infected already? Maybe it's such a good malware that you can't even find it.

Also, what do consumer protection laws in the US have to do with malware anyway? Malware is made to steal info or coerce the user to spend money, not the most legitimate business practices. Do you really think a malware writer stops to think if they are handling the passwords and credit card numbers they steal in accordance to the relevant legislation?

:allears:
The reason why I bring up consumer protection laws is that the banks are in a position to tell you to "gently caress off" if your infected computer leads to your online banking credentials being compromised. The liability shift has already occurred with the adoption of chip and PIN in the US where the banks can refuse a fraud claim based on the fact that a PIN was used for the transaction--this is in light of the fact that the PIN isn't even indicative of the card even being present considering recent developments in breaking the system.

Why I bring this up is that banks want to limit liability as much as possible and it shouldn't surprise anyone that if they get wind of your computer being the sole reason or even just a contributing factor for your account getting breached that they gain the ability to tell you to deal with the matter yourself since they're not at fault. I was trying to dig up a news piece on this very thing happening but in my cursory search I couldn't find the article I knew about where this did happen.

So yes. My statement about consumer protection laws is more than apt here.

Khablam posted:

How have you concluded the threat chance of a machine that shows clean to the list of things he mentioned?

Like, the problem here is you perform a risk assessment based on a notion that every piece of malware is a theoretical worst-case scenario and cry and stamp your feet and project your frustrations onto people who suggest anything other than a contingency for that.

I'll ask again for an example of a relevant threat that exhibits the need for this paranoia, and you will just reply without such, ask me to prove a negative, and carry on insulting me whilst just yelling "I'm right because I am right" which isn't useful in this thread or any other.

Of course there is a chance. I have never disputed that. What I am saying and what you're failing to understand here is that you cannot prove that the infection has been resolved. Again, does the concept of "risk assessment" allude you?

Read my above post for why any person should be paranoid. It's not without justification and I think you're arguing with me because I've proven time and time again that you're wrong.

Adbot
ADBOT LOVES YOU

Sharktopus
Aug 9, 2006

everyone calm down.

I'm sure when this guy was going over threat models with his $500/hr lawyer customers they decided together that it wasn't worth keeping garden variety malware off of the machines.

Dessert Rose
May 17, 2004

awoken in control of a lucid deep dream...

OWLS! posted:

Man, I respect you infosec guys, and I get why you have to be in paranoia mode at all times, but sometimes you gotta break it down for the mortal folks.
Being all angry :smuggo: about it aint' going to win you fans, (or get people to follow your advice.)

It isn't about winning fans. Having wrong ideas about computer security is loving dangerous. Selling wrong ideas about computer security, and passing them off as "good enough", is really loving dangerous.

We don't usually get mad at people who just don't have a clue ("mortals" as you put it). What gets us really mad is people who don't have a clue acting as though they do, arguing against people with clues, and especially people selling their nonexistent clues to other people and lulling them into a false sense of security.

We may sound paranoid to an outsider but oh man you should see what someone who is actually honestly paranoid about this stuff looks like. Check out #badbios if you want a taste.

univbee
Jun 3, 2004




mindphlux is in the wonderful MSP world and it's not possible to win with the clients security-wise. You will never convince them to have proper security policies in place, like having standardized images, a budget for spare machines, and the like. They will cheap out on anything and everything and when things inevitably go to poo poo they will try to throw you under the bus and make everything your problem. But of course, that doesn't stop me from getting them to agree in writing that system cleanliness without a reformat is not guaranteed, death is certain etc. I never ever tell my clients their system is clean unless I reformatted them completely.

Proud Christian Mom
Dec 20, 2006
READING COMPREHENSION IS HARD

univbee posted:

mindphlux is in the wonderful MSP world and it's not possible to win with the clients security-wise. You will never convince them to have proper security policies in place, like having standardized images, a budget for spare machines, and the like. They will cheap out on anything and everything and when things inevitably go to poo poo they will try to throw you under the bus and make everything your problem. But of course, that doesn't stop me from getting them to agree in writing that system cleanliness without a reformat is not guaranteed, death is certain etc. I never ever tell my clients their system is clean unless I reformatted them completely.

I'm in the MSP world and I'll just say that if you can't sell your clients on that then you're poo poo at your job

OWLS!
Sep 17, 2009

by LITERALLY AN ADMIN

Dessert Rose posted:

We may sound paranoid to an outsider but oh man you should see what someone who is actually honestly paranoid about this stuff looks like. Check out #badbios if you want a taste.

I have an idea that I have no idea how deep that particular rabbit hole goes but in the end, we're still just talking about computer viruses on an ancient comedy forum.

univbee
Jun 3, 2004




go3 posted:

I'm in the MSP world and I'll just say that if you can't sell your clients on that then you're poo poo at your job

To clarify, I don't manage the sales where I am, although I do push for sensible solutions (both internally and to my clients) as much as possible, and things are getting better; my writeup was maybe a bit overblown and based on working for other outfits I got the gently caress out from, but the scars still run deep.

We've mostly got them locked down, so issues which require (or should require) a total flatten-reinstall are fewer and further between, and the more problematic clients who don't listen are going to be ejected soon. :woop:

The last case we had (an AppLocker infection) got an imposed no-other-option total reinstall.

OWLS!
Sep 17, 2009

by LITERALLY AN ADMIN

Dessert Rose posted:

Check out #badbios if you want a taste.

Actually, since you mentioned it, could you elaborate a bit on this? I remember the big brouhaha about it back in 2013 or so, with people getting really spooked, and then sort of nothing. No real analysis, and even some stuff coming out (I may be misremembering) saying it was overblown somewhat? Anybody done any analysis on it, or is it anecdotes or what?

Khablam
Mar 29, 2012

OSI bean dip posted:

Of course there is a chance. I have never disputed that. What I am saying and what you're failing to understand here is that you cannot prove that the infection has been resolved. Again, does the concept of "risk assessment" allude you?

Read my above post for why any person should be paranoid. It's not without justification and I think you're arguing with me because I've proven time and time again that you're wrong.

You're basically tasking yourself to prove a negative, and concluding in your "risk assessment" that the absence of a threat is proof that there is one, and that existence of a threat is proof there is one.
This is paranoia by any definition and the reason people think you're a loony.

quote:

I've proven time and time again that you're wrong
You're the IT equivalent of the anti-vax people, where evidence there's no harm is just more proof to them there is, and no-ones opinion is worth anything to you if you disagree, and such any differing opinion is moot to you. You have never "proven" anything in this or any thread, you've simply kept screaming whilst the people less invested walk away.

If you're doing this to mission critical machines then you're right and there's no need to really say anything about it; doing anything else just isn't worthwhile. If you're doing this every time your mom's PC gets a toolbar you're probably in need of help.

Khablam fucked around with this message at 20:21 on Oct 22, 2015

Khablam
Mar 29, 2012

OWLS! posted:

Actually, since you mentioned it, could you elaborate a bit on this? I remember the big brouhaha about it back in 2013 or so, with people getting really spooked, and then sort of nothing. No real analysis, and even some stuff coming out (I may be misremembering) saying it was overblown somewhat? Anybody done any analysis on it, or is it anecdotes or what?

Nothing happened because it wasn't real.

Wiggly Wayne DDS
Sep 11, 2010



Khablam posted:

You're the IT equivalent of the anti-vax people, where evidence there's no harm is just more proof to them there is, and no-ones opinion is worth anything to you if you disagree, and such any differing opinion is moot to you. You have never "proven" anything in this or any thread, you've simply kept screaming whilst the people less invested walk away.
Anti-vax? Well we can talk about herd immunity, and how quacks make the situation worse but I feel like you may be on the wrong side of the argument in that case.

Proud Christian Mom
Dec 20, 2006
READING COMPREHENSION IS HARD

Wiggly Wayne DDS posted:

Anti-vax? Well we can talk about herd immunity, and how quacks make the situation worse but I feel like you may be on the wrong side of the argument in that case.

Being on the wrong side of the argument is his gimmick

Nintendo Kid
Aug 4, 2011

by Smythe

OWLS! posted:

Actually, since you mentioned it, could you elaborate a bit on this? I remember the big brouhaha about it back in 2013 or so, with people getting really spooked, and then sort of nothing. No real analysis, and even some stuff coming out (I may be misremembering) saying it was overblown somewhat? Anybody done any analysis on it, or is it anecdotes or what?

As it turns out, all you can really do with the speakers built into computers for transferring data is to very very slowly (on the order of a few dozen bytes per minute) transfer data, assuming you even had a BIOS/EFI embedded malware listening and sending through the speaker. Some university research crew performed experiments using consumer hardware and got at most 300 baud transfer in ideal scenarios, since speakers aren't all that hot at being microphones - and in situations where they simulated conditions being worse like say a laptop across the room from a desktop it dropped down to about 30-40 successfully transferred bytes per minutes. So in ideal conditions, like 99 megabytes could be transferred over a month, in normal conditions, you could transfer like 1.75 megabytes.

So the thing he was claiming about it spreading by sound is right out, because at best it could put out tiny updates to what's already there, and there's no practical way for it to infect anew. If he even had any malware actually going on, it'd have been because some expert had broken in and brought the stuff onto the systems by way of physical access.

Sharktopus
Aug 9, 2006

reminder that these ~400 bytes took down 1/3 of the internet

pre:
4500 0194 cf09 0000 8011 e630 c0a8 0164
c0a8 016a 049f 059a 0180 ac8d 0401 0101
0101 0101 0101 0101 0101 0101 0101 0101
0101 0101 0101 0101 0101 0101 0101 0101
0101 0101 0101 0101 0101 0101 0101 0101
0101 0101 0101 0101 0101 0101 0101 0101
0101 0101 0101 0101 0101 0101 0101 0101
0101 0101 0101 0101 0101 0101 01dc c9b0
42eb 0e01 0101 0101 0101 70ae 4201 70ae
4290 9090 9090 9090 9068 dcc9 b042 b801
0101 0131 c9b1 1850 e2fd 3501 0101 0550
89e5 5168 2e64 6c6c 6865 6c33 3268 6b65
726e 5168 6f75 6e74 6869 636b 4368 4765
7454 66b9 6c6c 5168 3332 2e64 6877 7332
5f66 b965 7451 6873 6f63 6b66 b974 6f51
6873 656e 64be 1810 ae42 8d45 d450 ff16
508d 45e0 508d 45f0 50ff 1650 be10 10ae
428b 1e8b 033d 558b ec51 7405 be1c 10ae
42ff 16ff d031 c951 5150 81f1 0301 049b
81f1 0101 0101 518d 45cc 508b 45c0 50ff
166a 116a 026a 02ff d050 8d45 c450 8b45
c050 ff16 89c6 09db 81f3 3c61 d9ff 8b45
b48d 0c40 8d14 88c1 e204 01c2 c1e2 0829
c28d

22 Eargesplitten
Oct 10, 2010



go3 posted:

I'm in the MSP world and I'll just say that if you can't sell your clients on that then you're poo poo at your job

Do you not read the pissing me off thread? Every few pages there is someone talking about how their client refuses to get off of XP/2003, or buy any sort of backup system. Some companies just refuse to do what is needed.

Ynglaur
Oct 9, 2013

The Malta Conference, anyone?

Nintendo Kid posted:

As it turns out, all you can really do with the speakers built into computers for transferring data is to very very slowly (on the order of a few dozen bytes per minute) transfer data, assuming you even had a BIOS/EFI embedded malware listening and sending through the speaker. Some university research crew performed experiments using consumer hardware and got at most 300 baud transfer in ideal scenarios, since speakers aren't all that hot at being microphones - and in situations where they simulated conditions being worse like say a laptop across the room from a desktop it dropped down to about 30-40 successfully transferred bytes per minutes. So in ideal conditions, like 99 megabytes could be transferred over a month, in normal conditions, you could transfer like 1.75 megabytes.

So the thing he was claiming about it spreading by sound is right out, because at best it could put out tiny updates to what's already there, and there's no practical way for it to infect anew. If he even had any malware actually going on, it'd have been because some expert had broken in and brought the stuff onto the systems by way of physical access.

Basically this, though it could be bad. #badbios was never proven to even exist. The lone researcher whom it infected never managed to infect anybody's machines but his own. Is it possible somebody was targeting only him because of ~reasons~? Sure. Is it likely? Not really.

Pushing even a few bytes over an otherwise air-gapped device can be a big deal, however. Such a BIOS-inhabiting device could, for example, parse keyboard inputs looking for likely userid and password combinations, and send those over the air. Still, applications for using speakers to transmit data probably have more applications in corporate espionage or nation-states spying on one another than on "I'm going to get Jim's bank account."

For the truly paranoid, of course, as alluded above there really isn't anything a normal person a can do about the Evil Maid vector of attack. Once someone has physical access to the hardware, all bets are off.

Mr Chips
Jun 27, 2007
Whose arse do I have to blow smoke up to get rid of this baby?

Ynglaur posted:

#badbios was never proven to even exist.
ahh, but was it ever proven not to exist?
:smuggo:

Ynglaur
Oct 9, 2013

The Malta Conference, anyone?

Mr Chips posted:

ahh, but was it ever proven not to exist?
:smuggo:

drat. I just lost an argument on the Internet.

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

In my business environment, if I get malware on my machine, I get a new piece of hardware and my documents copied over (but nothing executable and no source trees) while they analyze the victim machine. "In a business environment" doesn't excuse putting the business at unnecessary risk, and it's irresponsible to let customers think you've remediated the situation by buffing out the scratches just because they don't want to wait for the body work.

(That's part of why I stopped doing security consulting many years ago. Clients wanted guarantees I couldn't give them, or me to give them approval for expedience that didn't match their stated threat stance. If someone at the customer wants to say it's all better because they deleted the php script payload from the web root, they can do that, but I'm not going to.)

Tapedump
Aug 31, 2007
College Slice

Wiggly Wayne DDS posted:

Anti-vax? Well we can talk about herd immunity, and how quacks make the situation worse but I feel like you may be on the wrong side of the argument in that case.
Wait, is this indicative of your own siding with the anti-vax stance, or is it just you drawing an analogy to the info sec argument here?

The answer is really, really important.

Wiggly Wayne DDS
Sep 11, 2010



Tapedump posted:

Wait, is this indicative of your own siding with the anti-vax stance, or is it just you drawing an analogy to the info sec argument here?

The answer is really, really important.
Analogy, but when we're talking about infections and how poor solutions make a situation worse the line really becomes blurred.

Lain Iwakura
Aug 5, 2004

The body exists only to verify one's own existence.

Taco Defender

Wiggly Wayne DDS posted:

Analogy, but when we're talking about infections and how poor solutions make a situation worse the line really becomes blurred.

Oh. But it's okay because I'll just state that it's not worth my client's time to go and do things the right way and then go on about someone being a "loony" when they call me out on my inability to comprehend the problem at hand.

And that is why we have things in the state they are because people don't want to take the time to understand things.

Khablam
Mar 29, 2012

OSI bean dip posted:

Oh. But it's okay because I'll just state that it's not worth my client's time to go and do things the right way and then go on about someone being a "loony" when they call me out on my inability to comprehend the problem at hand.

And that is why we have things in the state they are because people don't want to take the time to understand things.

Usually people only get as mad-angry as you do over this when they feel like their USP is being infringed upon. I get it, 10 years ago you were a ~genius~ if you could stop mom's PC from having that weird popup, but now that people have largely worked this out for themselves you need to constantly yell that they're doing it wrong to convince people you have value.

To use the medical analogy again, you're a doctor getting hysterically angry that people can work out they have a common cold all on their own, and wailing about risk assessments and IT MIGHT BE MALARIA OR MENINGITIS OR CANCER OH GOD GET HELP.
Not necessarily wrong, but effectively stupid in practice because the health service can't sustain everyone ~doing it properly~ in the eyes of paranoid skeptics.

How are you doing on finding the example malware that avoids any detection at all against the list he posted?

Lain Iwakura
Aug 5, 2004

The body exists only to verify one's own existence.

Taco Defender

Khablam posted:

Usually people only get as mad-angry as you do over this when they feel like their USP is being infringed upon. I get it, 10 years ago you were a ~genius~ if you could stop mom's PC from having that weird popup, but now that people have largely worked this out for themselves you need to constantly yell that they're doing it wrong to convince people you have value.

To use the medical analogy again, you're a doctor getting hysterically angry that people can work out they have a common cold all on their own, and wailing about risk assessments and IT MIGHT BE MALARIA OR MENINGITIS OR CANCER OH GOD GET HELP.
Not necessarily wrong, but effectively stupid in practice because the health service can't sustain everyone ~doing it properly~ in the eyes of paranoid skeptics.

How are you doing on finding the example malware that avoids any detection at all against the list he posted?

Sure. How about a rootkit where the OS is compromised before the bootloader is even engaged?

I am sure your help desk experience will give me an enlightened response.

Dessert Rose
May 17, 2004

awoken in control of a lucid deep dream...

Khablam posted:

Usually people only get as mad-angry as you do over this when they feel like their USP is being infringed upon. I get it, 10 years ago you were a ~genius~ if you could stop mom's PC from having that weird popup, but now that people have largely worked this out for themselves

I'm dying :lol:

Kazinsal
Dec 13, 2011

OSI bean dip posted:

Sure. How about a rootkit where the OS is compromised before the bootloader is even engaged?

I am sure your help desk experience will give me an enlightened response.

Better yet, a rootkit where the OS is compromised while it's being installed.

Khablam
Mar 29, 2012

OSI bean dip posted:

Sure. How about a rootkit where the OS is compromised before the bootloader is even engaged?

I am sure your help desk experience will give me an enlightened response.

Which one in particular does this whilst not appearing to an offline scan or the other rootkit tools mindplux mentioned?
If it does this, then how are you concluding you have this particular infection in the first place?
Why are you checking for it?
Should you not then not expand your flatten-install technique as a daily startup procedure?

e: To be more precise in what I'm saying:

You keep saying "risk assessment" but in any risk assessment you will list and analyse hostile elements. You claim on one hand you base this on "risk assessment" yet on the other you seem to be unable to actually notarise the threat(s) you are talking about, instead when pressed you (usually) just wave your hand vaguely at some blog posts by half-insane researchers ranting that their speakers are infecting their machines, as an example of what can go wrong.
I'm not denying a ~bad virus~ can or does exist, but when you look at malware as a whole my out-of-my-rear end "0.001%" figure for something successfully evading the list of things you claim to be "dangerously useless" is possibly overly pessimistic and it's probably a lot smaller.

Khablam fucked around with this message at 00:51 on Oct 25, 2015

Prosthetic_Mind
Mar 1, 2007
Pillbug

Khablam posted:

To use the medical analogy again, you're a doctor getting hysterically angry that people can work out they have a common cold all on their own, and wailing about risk assessments and IT MIGHT BE MALARIA OR MENINGITIS OR CANCER OH GOD GET HELP.

And you're the doctor who treats the symptoms instead of the disease.

Khablam
Mar 29, 2012

Prosthetic_Mind posted:

And you're the doctor who treats the symptoms instead of the disease.

I like this analogy because that's often the appropriate course of action.

Geemer
Nov 4, 2010



Khablam posted:

I like this analogy because that's often the appropriate course of action.

Don't worry. As soon as we invent perfect cloning while keeping memories intact, idiots will be screaming that as soon as you get the common cold, you should be killed and replaced with a fresh clone.

Ynglaur
Oct 9, 2013

The Malta Conference, anyone?

Prosthetic_Mind posted:

And you're the doctor who treats the symptoms instead of the disease.

So, we're all in agreement. The solution is to find and kill people who make malware. While we're at it, let's eliminate greed, fear, and perhaps poo poo-stirring. Meeting adjourned?

Lain Iwakura
Aug 5, 2004

The body exists only to verify one's own existence.

Taco Defender

Khablam posted:

Which one in particular does this whilst not appearing to an offline scan or the other rootkit tools mindplux mentioned?
If it does this, then how are you concluding you have this particular infection in the first place?
Why are you checking for it?
Should you not then not expand your flatten-install technique as a daily startup procedure?

e: To be more precise in what I'm saying:

You keep saying "risk assessment" but in any risk assessment you will list and analyse hostile elements. You claim on one hand you base this on "risk assessment" yet on the other you seem to be unable to actually notarise the threat(s) you are talking about, instead when pressed you (usually) just wave your hand vaguely at some blog posts by half-insane researchers ranting that their speakers are infecting their machines, as an example of what can go wrong.
I'm not denying a ~bad virus~ can or does exist, but when you look at malware as a whole my out-of-my-rear end "0.001%" figure for something successfully evading the list of things you claim to be "dangerously useless" is possibly overly pessimistic and it's probably a lot smaller.

You're failing to provide answers with examples where I am supposedly wrong other than theoreticals. So far you've demonstrated that you can only think of what a tool outputs and have provided no notion of experience of working with real malware. Tell me, what experience do you have with malware? Is it just from the help desk that you work at?

Once again, tell me how you address a rootkit where the OS has been compromised before its bootloader has been engaged. Cite the exact process and why you think that this methodology is foolproof. Don't go on about some other thing where all you're doing is trying to belittle me while failing to adequately answer my question.

Also, to your "risk assessment" point: you're being completely obtuse and because of this I reserve the right to belittle you here. I've spelt out a perfect example where a typical user is at risk for having issues with their financial institution due to an infected machine, leading to a potential for real financial loss--was my post too complicated for you? If so, I'll gladly simplify it.

To add: a "risk assessment" is not about "analysing hostile elements". A "risk assessment" involves researching the situation and determining the outcomes and consequences, leading to a result that'll let you determine if the risk is acceptable or not. Here's something from the US government if you need to learn a bit more because I think you probably do.

Also, at no point have I brought up any "half-insane researchers" so I am not sure why you're choosing to say this. Hate to break it to you, but I have met the "half-insane researcher" you're alluding to and you don't even know half the truth of his nuttiness.

So again, instead of trying to go on a feckless tirade about I am supposedly wrong here, why not answer my question? Surely your confidence in your response can be turned into a technical answer right?

Lain Iwakura fucked around with this message at 18:23 on Oct 25, 2015

Dessert Rose
May 17, 2004

awoken in control of a lucid deep dream...
Uh, I was the one that brought up the badbios guy and I did it specifically as an example of someone who has in fact gone off the deep end. No one has brought that thing up as an actual risk.

bobbilljim
May 29, 2013

this christmas feels like the very first christmas to me
:shittydog::shittydog::shittydog:
Everyone knows that doing things the right way is actually too much work, so we might as well half rear end it.

mindphlux
Jan 8, 2004

by R. Guyovich
also let's not bother to provide any positive examples of what we think 'the right way' is, and instead just troll people on the internet, it will be great, I promise.

Wiggly Wayne DDS
Sep 11, 2010



mindphlux posted:

also let's not bother to provide any positive examples of what we think 'the right way' is, and instead just troll people on the internet, it will be great, I promise.
From the sounds of it you seem to be very keen on not learning anything, and are dismissing anything critical as trolling. When you're providing bad security services to lawyers you're well past the "positive examples" stage, and into the "beyond help" part of the process. I sincerely hope they are aware of the level of risk you are putting them and their clients critically-sensitive data at when you provide your services, or you're going to meet more lawyers in your future.

mindphlux
Jan 8, 2004

by R. Guyovich

Wiggly Wayne DDS posted:

From the sounds of it you seem to be very keen on not learning anything, and are dismissing anything critical as trolling.

no, I actually have asked about 5 times for examples of how you guys propose to handle malware/virus problems in a reasonable amount of time. I outlined my SOP line by line, please outline yours line by line.

I don't claim that anything you're saying is technically incorrect, but flattening a system or spending hours isolating machines and doing packet/process traces every time a machine gets some java exploit or something is not practical.

univbee
Jun 3, 2004




Do your clients seriously not have spare machines? Because that's a pretty big deal. What do you do if their motherboard fries or their hard drive crashes?

Wiggly Wayne DDS
Sep 11, 2010



mindphlux posted:

no, I actually have asked about 5 times for examples of how you guys propose to handle malware/virus problems in a reasonable amount of time. I outlined my SOP line by line, please outline yours line by line.

I don't claim that anything you're saying is technically incorrect, but flattening a system or spending hours isolating machines and doing packet/process traces every time a machine gets some java exploit or something is not practical.
Can you express to me the financial and reputational damage of your lawyer clients having malware after you've assured them that their system is clean? This isn't a situation where you can perform sloppy practices, especially not for a paycheck.

Adbot
ADBOT LOVES YOU

Lain Iwakura
Aug 5, 2004

The body exists only to verify one's own existence.

Taco Defender

mindphlux posted:

no, I actually have asked about 5 times for examples of how you guys propose to handle malware/virus problems in a reasonable amount of time. I outlined my SOP line by line, please outline yours line by line.

I don't claim that anything you're saying is technically incorrect, but flattening a system or spending hours isolating machines and doing packet/process traces every time a machine gets some java exploit or something is not practical.

But your suggestion from earlier is good enough to tell people that your method should go into the OP? Do you tell your customers that they're putting themselves at risk by just having things "cleaned up" instead of addressed properly?

This is why you're getting shitted all over here. You come into the thread, list off a bunch of tools without explaining anything about what each does (and I suspect that you don't anyway), and then cry foul when you're called out over it. If you had at least disclaimed, "this is a way that you could address your malware infection but you should think about the risk you have by not reformatting" then I wouldn't have given a drat because that is the way you should approach it.

However, you instead didn't like the criticism I gave of your post and then went on some dumb tirade about how I am "trolling you" when in reality pointing out that you have no clue. Most people who go about suggesting ComboFix tend to be the type that think that it's an IT worker's wet dream. You just wanted to come into here and act like an "IT superhero" like most of your type believe you are, with a suggestion without warning. You don't even point out the problems that someone will have with the tools you suggest either. How did you know the person who requested help could use at least a third of them and knowing what they do?

That's loving dumb and in some ways dangerous and negligent.

Lain Iwakura fucked around with this message at 15:07 on Oct 27, 2015

  • Locked thread