IWETHEY v. 0.3.0 | TODO
1,095 registered users | 0 active users | 0 LpH | Statistics
Login | Create New User
IWETHEY Banner

Welcome to IWETHEY!

New Conducted an experiment ...


Set up a clean XP Virtual PC - installed AdAware6, SpyBot S&D 1.2 and Ultimate Startup Manager 1.2

I downloaded latest updates for AdAware & SpyBot & also applied SpyBot immunisation (it says it immunised 505 items).

I checked Startup for any starters in the 4 categories it shows.

Then I went to a known infector site (www.Astalavista.com)

Then after visiting a few of their poisonous sites (refused all pop-ups asking for permission to download etc:).

Then I exited the searching & ran the various checkas

1) I looked in Starters & found a thing called sr64 in the HKCU_Services list
2) Ran Spybot & removed approx 7 new cookie entries & 3 registry entries
3) AdAware then removed another 15 items, 6 listed as malware & 9 as Data miners

Also my web browsers home page had been altered to point to SearchCentral.cc


Proved an interesting exercise

a) SpyBot and AdAware on their own seem to miss stuff.
b) The 'startups manager' program is helpful
New Can you conduct a follow-up?
Try the same experiment, except download Firefox and visit the same sites with that.

I'm curious how much crap you block by avoiding giving them IE (with its known bugs) to start with.

Cheers,
Ben
"good ideas and bad code build communities, the other three combinations do not"
- [link|http://archives.real-time.com/pipermail/cocoon-devel/2000-October/003023.html|Stefano Mazzocchi]
New Interesting.
I went to that site and got ZERO advertisements, zero malware.

Funny, I have no idea what you are talking about (both of you)
--
[link|mailto:greg@gregfolkert.net|greg],
[link|http://www.iwethey.org/ed_curry|REMEMBER ED CURRY!] @ iwethey

'In view of the fact that Microsoft is a condemned monopolist and on the other hand the internal messages and financial transactions of SCO look ever doubtful, Microsoft should be really anxious that to the own company something does not remain sticking from the Gestank of the SCO.' --Plagarized from [link|http://www.groklaw.net/article.php?story=20040322133607169|GROKLAW]
New Well what I'm talking about...
is that I assume that he is right that that site will add malware to a Windows system with IE.

I'm wondering what fraction of that vulnerability is IE specific, and how much is just Windows being shite.

Cheers,
Ben
"good ideas and bad code build communities, the other three combinations do not"
- [link|http://archives.real-time.com/pipermail/cocoon-devel/2000-October/003023.html|Stefano Mazzocchi]
New I did use IE for the experiment.

Greg,

I wouldn't be surprised if some of the astalavista links are blocked in the US.

I can guarantee that on my computer roaming around a few of the Astalista links (warz sites) will deposit the same malware & adware each visit.

I did find that using Spybot innoculation has side effects (that I didn't want) for one it blocked my Quicken stock portfolio tracking. Only when I undid the immunization did the quicken stuff appear (my barometer for tech stocks in US).

I will look at the experiment with Firefox

Cheers Doug
New Loaded Firefox 0.8 - results
1) Checked status with both Adaware & Spybot. AdAware clear, Sybot no threats found!

2) Ultimate startup - no entries in any of the 4 categories

3) Started Firefox & went to Astalavista
- 1st meaasge I got was that I needed a plug-in - Plug-in finder Mozilla Firefox seemed to want Java. I eventually shut that window as I couldn't make any sense of what it was that was supposed to be downloaded
- At Astalavista I selected (from Underground search I selected ms******.com) & used A***** as th search arg
- upon reaching that site I had a request to install a 'Content Access Plugin 1.01' - I declined.
- From the ms******.com site I clicked on a link to the****.ws site
- I clicked on their enter link
- I had an unsolicited pop-up window that said timeout trying to access 81.13.66.62 - I closed it
- at the******.ws I clicked on 1st link in their list
- I did a search on M**** (the full name :-)
- I selected a product belonging to the nominated company
- A window opened with the requested info & also there was a request to vote on this site
- I clicked 'vote for us' (several screens later I gave up)
- At this point I had had enough & closed all the windows

- upon exiting firefox I got an error screen ...
'Firefox.exe has encountered a problem and needs to close'
I was advise to notify Microsoft. I clicked the don't send button
- next I disabled the VPC XP's network adapter & ran Spybot, Adaware & Starter


RESULT
======

Adaware:
No malware or cookies or any new problems

Spybot:
'No immediate threats found' !!!!

Starter:
Clean

- I am surprised, I thought there would be some artifacts of this fact finding exercise :-)

#2 - I later found that Spybot immunization was active - for reasons I can't determine at this time, the immunisation won't switch off - I may have to restore the original VPC and repeat everything without having invoked the immunisation which I had done for a separate test.
Expand Edited by dmarker March 27, 2004, 06:30:45 PM EST
New Scrub test - I found I still had spybot immunisation active

Will re do it all again tomorrow but will turn off imunisation on the VPC WinXP (I had deactivated on the normal WnXP host OS).

Doug
New This post is via Firefox via VPC WinXP. Firefox ok

no crash after using Firefox to visit Iwethey.

Will reconfirm results by doing same test but with IE

Doug M
New Thanks, I look forward to the results
"good ideas and bad code build communities, the other three combinations do not"
- [link|http://archives.real-time.com/pipermail/cocoon-devel/2000-October/003023.html|Stefano Mazzocchi]
New Hmmm not what I was expecting at all ...


1) Firefox

- www.astalavista.com
- 'A web site has attempted to open a pop-up without your permission' (I clicked ok to continue - popup blocked)
- 'Plug-in not loaded' - java-vm (I clicked get the plug-in)
- I then seemed to be at a Netscape page. I closed it
- Then selected ms******.com with a search arg of ****** (censored)
- Then clicked the 4th item in the displyed list
- The requested data displayed but also a window with a msg ..
'A web site is requesting permission to install the following item:'
'Content Access Plugin 1.01' (I declined)
- I returned to he list & selcetd another item
- The requested data appeared (no window this time)
- I then chose the 1st ref link on left side of ms******.com home screen
- (<something>Spider.net) - entered a search arg & clicked search
- Nothing came back so shut that site's window
- Clicked another ref link from ms*****.com (*****Portal.com)
- No results so used The****.ws search engine
- Ended up at *****Search.ws
- Clicked a link to #####.nu
- Went to 4 more sites and at 1 downloaded 4 small files - Firefox asked me what I wanted to do with them
I clicked 'save to disk' but I don't really know (yet) where Firefox was putting them\\
- Had enough (by this time, if this was MSIE, I would expect 20+ cookies & 6 malware entries)
When I had exited all the web sites I found the downloaded files on the desktop.


Ran AdAware and Spybot plus Starter

ALL 3 WERE PRISTINE - NO NEW THREATS


2) MSIE on WinXP Home (pristine install)

Now to do same with Windows MSIE (Home Edition WinXP)
- www.astalavista.com
- Got a pop-up window (closed it)
- Got cookie warning (closed it)
- Got a Security Warning window - asked me if I wanted to accept some 'must be older than 18 pgm' (clicked close)
- Got similar Security Windows 4 more time in visiting same sites as in test 1 above. Closed them each time


Ran Adaware and SpyBot plus Ulimate Starter

Hmmmm -- this time apart from 3 tracking cookies and Spybot recording 'Error During Check
- Hotbar (Ungultige Gleitkommaoperation)' same result as for FireFox - no new threats.

This I don't follow - the main difference between today's & yesterdays tests has been setting up a newly
installed VM of WinXP home whereas the other was a copy of WinXP Pro.

The test I had done with WinXP Pro I did 3 times & got the corruptions each time.

There has to be some other thing I am missing here.

Doug Marker



New One last very odd discovery
On a hunch I ran Spybot on the host WinXP Home edition & it found both Malware & cookies

Malware downloads
Tracking cookies

So what to make of using VPC ? - dunno

Doug M

#2 -

1 x Double click
1 x DyFuCa
2 x HitBox
2 x PowerScan (an executable)
3 x Roings (2 of which were downloaded modules - 1 x Code Storage Database)


Expand Edited by dmarker March 28, 2004, 04:27:11 PM EST
New Let's just say...
I'm very glad that I don't have to deal with that kind of crap. ;-)

Thanks for investigating. The inconclusiveness of your results underscores why your average user has no clue of figuring out what is really going on.

Cheers,
Ben
"good ideas and bad code build communities, the other three combinations do not"
- [link|http://archives.real-time.com/pipermail/cocoon-devel/2000-October/003023.html|Stefano Mazzocchi]
New Not done yet - will get to bottom of this ...
My main system acts as if it is innoculated. Also there was one other odd event that occured right at the time I cleaned up the host system.

Going back to when this all started.

1) Cleaned up host#1 after 1st noticing excessive & questionable pop-ups
(used Spybot & AdAware)
2) This host#1 is used for Internet browsing & is isolated from several other
servers where serious work gets done. I have an initial image of host#1
as supplied by the vendor. This is a WinXP Home edition machine.
3) The day of the above clean-up I added a login password (hadn't bothered
before as I can always rebuild the machine & consequently qasn't all that
bothered.
The day I added the login password, the system seemed to hang while booting.
After several restarts & checking the Ram & disk connections, I let the
machine take its time & it eventually booted (now boots like this each time).

I was sure I saw some Internet activity during the dead screen period - on
first start up I immediately had tried to disable the network connection but
found an extra network adaptor icon (configured with an ip address) & seemed
unable to turn it off (ignored the disable command).

I shut the system down again & removed its UTP cable. Upon restart (slow)
the network connection adapter icons were normal. (The icon resembled the
type of network adapter that VMWare adds when it gets installed).

I am now about to wipe this host#1 machine clean & do factory re-install.
I will also re-install Connectix VPC and a pristine copie of XP in one
VPC (have the WinXP CD that came from mfg. It installs ok as a VPC.

If anyone has any clues as to why the machine might have behaved the above way
I am all ears. Because the situation is abnormal as regards the events, I don't
know what interpretation to place on them. Am not overly worried as I can and
will reset to square one & I was deliberately pushing things as regards spyware.

Doug M

#2

AS OF TODAY - the host#1 computer is back to fast booting again. I haven't yet done the complete reinstall so I have no explanation as to why this has happened. The only other thing I have noticed is that while the slow boot was occuring, SpyBot would always list an error during checking. That seems to have gone now. ?.
Expand Edited by dmarker March 29, 2004, 09:40:16 PM EST
New Have you tried HijackThis?
Play I Some Music w/ Papa Andy
Saturday 8 PM - 11 PM ET
All Night Rewind 11 PM - 5 PM
Reggae, African and Caribbean Music
[link|http://wxxe.org|Tune In]
New Re: Have you tried HijackThis?

Nup, What is it ?

Doug
New Re: Have you tried HijackThis?
HijackThis lets you view anything that initializes in the registry
yu can choose to remove any (if you are not comfortable with the registry this could be deadly)

When AdAware and A/V s/w fail I go to HijackThis

A
Play I Some Music w/ Papa Andy
Saturday 8 PM - 11 PM ET
All Night Rewind 11 PM - 5 PM
Reggae, African and Caribbean Music
[link|http://wxxe.org|Tune In]
     Conducted an experiment ... - (dmarker) - (15)
         Can you conduct a follow-up? - (ben_tilly) - (11)
             Interesting. - (folkert) - (10)
                 Well what I'm talking about... - (ben_tilly) - (9)
                     I did use IE for the experiment. - (dmarker)
                     Loaded Firefox 0.8 - results - (dmarker) - (1)
                         Scrub test - I found I still had spybot immunisation active - (dmarker)
                     This post is via Firefox via VPC WinXP. Firefox ok - (dmarker) - (5)
                         Thanks, I look forward to the results -NT - (ben_tilly) - (4)
                             Hmmm not what I was expecting at all ... - (dmarker) - (3)
                                 One last very odd discovery - (dmarker) - (2)
                                     Let's just say... - (ben_tilly) - (1)
                                         Not done yet - will get to bottom of this ... - (dmarker)
         Have you tried HijackThis? -NT - (andread) - (2)
             Re: Have you tried HijackThis? - (dmarker) - (1)
                 Re: Have you tried HijackThis? - (andread)

Dude!
79 ms