Edited by Avohir, 19 March 2005 - 03:43 PM.

Theory
#91
Posted 19 March 2005 - 03:43 PM
Register to Remove
#92
Posted 19 March 2005 - 05:45 PM

Edited by Zero, 19 March 2005 - 05:46 PM.

#93
Guest_Paperghost_*
Posted 20 March 2005 - 04:22 AM
and the point youre mising in all of this Zero - is that with default settings on for both java and whatever browser you happen to be using at the time, you will end up with the java popup, the openstream, the active x prompt, the very real possibility of being infected by something.
Telling people in this thread how to switch off the cache is great, but to the millions of people who will never see the original article, much less this thread, or wonder why so much effort went into what the word "exploit" means, it doesnt mean a hill of beans and their default settings will remain intact. After all, I'm willing to bet theres a slew of people across all the ASAP sites who are excellent spyware / malware removers, but may not know the first thing about fiddling with default java settings - and in some respects, you could say, why should they? Most spyware infections have always been able to be canned with HJT, and maybe a bit of registry tweaking. Occasionally, you migth have to pull out the batch tools and other custom builders.
But the fact remains, the scope of what you now need to know now to clean out pcs is growing rapidly - and its going to be a very hard task to keep up.
#94
Posted 20 March 2005 - 07:31 AM
After all, I'm willing to bet theres a slew of people across all the ASAP sites who are excellent spyware / malware removers, but may not know the first thing about fiddling with default java settings - and in some respects, you could say, why should they? Most spyware infections have always been able to be canned with HJT, and maybe a bit of registry tweaking. Occasionally, you migth have to pull out the batch tools and other custom builders.
And I am one of them...maybe not EXCELLENT but working on it but you're right, paperghost. Until THIS thread, I didn't know the first thing about java settings or the java cache but I AM learning. Liz
SouthernladySecurity.com
Southernlady's Ramblings My blog
Member of ASAP since 2005
#95
Guest_Paperghost_*
Posted 20 March 2005 - 09:06 AM
And I am one of them...maybe not EXCELLENT but working on it but you're right, paperghost. Until THIS thread, I didn't know the first thing about java settings or the java cache but I AM learning. Liz
Which is excellent - if everyone knows a little bit more about other areas of infection out of this then thats a very good thing.
The biggest problem in all of this is a case of collective non-responsibility - the problem appears to be everyone's, and so therefore is no-one's to resolve. Microsoft say its the other guys browser - the other guys browser says its java - java say the applet is doing exactly what its supposed to. Round and round we go.
Though that doesnt help the end user who gets infected and doesn't know how or why - all they will say is "oh yeah, i was using firefox at the time, ohh man how did THAT happen? Stupid browser."
You know their view of what happened will be incorrect. I know that too. But they will most likely just blame the browser regardless. They're not likely to be aware of whitelisting, sandboxes, Runtime.exec() and all the rest of it. They'll just blame the browser and go back to IE again, or something equally silly. and that WOULD be a shame.
#96
Posted 20 March 2005 - 10:57 AM
Edited by nlinecomputers, 20 March 2005 - 10:58 AM.
#97
Posted 20 March 2005 - 11:25 AM
And to the average user, a .jar file that is a "virus" and does nothing unless they go to the java console and activates it, affects them how? It doesn’t unless they code something else to activate it. (in which case if it activates the jar file without user knowledge, that would be an exploit)
"and the point youre mising in all of this Zero - is that with default settings on for both java and whatever browser you happen to be using at the time, you will end up with the java popup, the openstream, the active x prompt, the very real possibility of being infected by something."
If you're using the internet the very real possibility of being infected by something is high, that is common sense.
"Telling people in this thread how to switch off the cache is great, but to the millions of people who will never see the original article, much less this thread, or wonder why so much effort went into what the word "exploit" means, it doesn’t mean a hill of beans and their default settings will remain intact."
Again, it doesn’t actually harm their computer, unless they click yes (but that is going round in circles in this discussion). The jar file in this case, because of the users default settings, just sits there, doesn’t do a thing; malicious it may be, however, it does nothing like a normal good little cache file.
Edited by Zero, 20 March 2005 - 11:26 AM.

#98
Guest_Paperghost_*
Posted 20 March 2005 - 02:36 PM
If a vaguely decent hacker compromises a system with a bog-standard remote access tool then decides to go sniffing around the folders - most likely one of the first places he'll visit is the temp and cache folders to see what rogue elements are running on the box. that way if theres anything there likely to conflict with their rummaging, or interfere with anything they want to run they can remove it first.
However, if theyre not that bothered, they might just start clicking into things to see whats there - especially if they know it shouldn't be present.
Bam - openstream / whatever else in whatever other temp folder is activated. "hilarity" ensues.
#99
Posted 20 March 2005 - 02:44 PM
Files being stored in cache isn't much to be alarmed over. It can be turned off, cleared, etc, so I don't even consider the fact its stored in cache that big of a concern. If a real exploit is devoloped that is purpsoly targeted at the .jar file stored in the cache, then I'll be alarmed.

#100
Posted 20 March 2005 - 02:48 PM

Register to Remove
#101
Posted 20 March 2005 - 09:07 PM
#102
Posted 20 March 2005 - 10:05 PM

#103
Posted 20 March 2005 - 10:52 PM
And that's why every PC I fix I give them a copy of CCleaner http://www.ccleaner.com free. It cleans the Java Cache and much much more. It gets run roughly 3 - 4 times a week.
Files being stored in cache isn't much to be alarmed over. It can be turned off, cleared, etc, so I don't even consider the fact its stored in cache that big of a concern. If a real exploit is devoloped that is purpsoly targeted at the .jar file stored in the cache, then I'll be alarmed.
I use that program and it is an excellent program. Just be sure to tell your customers to allow the program to make up a backup copy of their registry before they clean out "supposed" unneeded registry entries that are identified. The program would always identify unneeded file extensions in registry. Well, one of them wasn't so unneeded after all. It was needed to run by Anti-Trojan(TDS-3) program. I soon realized this, because everytime I would run ccleaner and allow it to delete all "unneeded" registry entries, I could no longer run TDS-3 and had to reinstall the whole program again. It took me a while to figure out that deletion of the necessary TDS-3 license file extension, via ccleaner, was responsible for this problem. When I stopped deleting that entry, TDS-3 started up problem free.
#104
Posted 20 March 2005 - 11:05 PM


#105
Guest_Paperghost_*
Posted 21 March 2005 - 03:06 AM

1 user(s) are reading this topic
0 members, 1 guests, 0 anonymous users