I’m currently trying to completely wipe clean the exclusions list of the Standard Shield for testing purposes. However, the Standard Shield apparently refuses to let me do that - it re-adds some exclusions back to the list automatically every time I remove them all.
Is there some way to get around this problem? Thanks in advance.
I believe that Tech is absolutely right … there are certain files that the avast team know it is pointless to scan and that scanning of them can never be of any value to anyone.
Given their expert knowledge - and the experience of the industry in general - I doubt if they have provided a work around.
Turn off avast!'s resident shields and download a malware file. Scan it with avast! to make sure avast! really can detect it. Now rename the file extension to something avast! excludes, I’ll use 1.ini here as an example, and save it. Turn the resident shields back on. Open the command prompt, and type “start 1.ini”.
I’m sure the average user must do this all the time - not.
But you ask me to deactivate avast before doing this - why would I be so foolish as to deactivate part of avast’s protection to indulge in a way you believe the protection of avast can be circumvented?
If you will (oh) please explain to me how this malware can be downloaded to my system and activated with avast’s protection active and in a way an avarage user might employ then I will be more than happy to comply with your scenario.
Of course average users don’t do this. It’s the black hat hackers who do.
If you have a piece of malware already renamed to .ini, then you don’t even need to disable avast!'s Standard Shield to see it fail spectacularly. The whole point of turning it off in the first place was so you could rename the malware in peace without being interrupted by avast!, because AFAIK most malware don’t come in .ini files yet (keyword is ‘most’, some Hupigon variants HAVE been using the .ini extension to camouflage themselves lately). So you could say that this is largely a theoretical weakness at the moment, but it’s only theoretical, not because it’s impossible to exploit, but because it’s not (very) widespread ATM.
If you acknowledge “the possibility of your suggestion for a first time user where the system has already been infected”, then by extension you are also acknowledging that any file with the extensions listed in the Standard Shield exclusions have no problem slipping past it. That was my whole point; what else do you want me to prove?
Well, apparently it seems that your aim here is to win the debate. :
Tell your friend to find a piece of malware. Rename it to any of the extensions excluded by the Standard Shield. Now write two files: 1) an autorun.inf file, pointing to a batch file
[autorun]
open=insert_name_here.bat
and 2) the batch file itself, which uses the “start” command to launch the malware, which had been previously renamed.
Next tell him to copy the 3 files (the inf and bat file, and the malware) to a USB drive. And, assuming you have autorun enabled on your computer, plug the USB drive into your computer.
I don’t know of any malicious drive-by downloads which use this method yet, so you’ll have to do it by USB. Theoretically, though, I don’t see what’s stopping a malicious website from similarly downloading an .exe renamed to .tmp or .ini or something similar, then using cmd.exe to invoke it.
Go ahead. Give it a try. I’m looking to answers to questions here, so hopefully this will keep you busy and away for a while.
Whatever happens next, whether you infect my system or not I suspect that you do have a valid point point for consideration and that I hope the avast team will respond to it.
While avast tries to be as efficient as possible in its regular scanning, which I applaud, I have long felt that on first installing avast there should be the option of an intense scan that would scan all files on the system. I have almost a terabyte of disk space on my system, I’m sure many have much more. I can imagine the reluctance of many to have the time taken up by such a scan.
Unless you can make a very clear case for the potential pathway for the infection you describe I doubt that many would go for more lengthy scans, especially on a more regular basis and unless your story is a lot more convincing than so far made.
I am looking for answers to questions too … the questions I have put to you. I am not trying to win a debate or prove a point. It, is after all, you who initiated this as a fault you believe you have detected in avast - I am simply asking you to demonstrate it rather than ask anyone to infect a system to prove your point.
You are asking that malware be deliberately inserted on the system without avast having any chance to detect it.
Please tell me how you imagine that, in normal use, that malware gets onto the system in the first place.
Well, you could always, you know, walk the walk and actually TRY it, and then see what happens You’re welcome to ask if you don’t know how to write the files. Obviously, by asking me to prove to you how this could take place in an everyday scenario, you apparently have no idea how non-P2P worms typically spread. This IS an everyday scenario.
And just FYI, this flaw doesn’t exist with manual scans, because you can wipe the exclusions list clean so that avast! scans all files. It’s the Standard Shield that insists on not letting users delete some exclusions AND scanning files based on extensions rather than content type, that actually causes this loophole.
I admit I had not considered the option of USB drive - for which I certainly would not consider the option of autorun. I will have to defer to the avast team on that one for those foolish enough to do so.
I do walk the talk. I have offered my system. Tell me a web site to visit, I will provide you with an email address to send me an infected email. I do not use P2P.
Let me know how I might help you prove the point. You are not depending solely on the ‘on acess’ scanner to make your case are you?
And you do know that the exclusion lists are not effective in the P2P file scanning?
Well, you could start by stopping the round-the-bush beating and try the steps I have outlined. Waiting to hear your results.
And oh, if autorun doesn’t work on batch files for you, try writing a go-between vbs script between the inf and the bat. I’m not sure why, but autorun refused to launch the bat file on my system. Telling autorun to run a script than runs the batch file solves the problem for me though.
Sorry I have not yet needed a USB key. I transfer files across the network at home and only with trusted individuals across the net - and even then they are scanned as downloaded.
Is the USB key the only path you can come up with - I have offered other ways.
I don’t know of any malicious websites that serve malware with .ini filenames at the moment, and I’m not savvy enough to create one on the fly, unfortunately.
Still waiting for your results. Doesn’t necessarily have to be a USB drive, that’s just what commonly happens. ANY drive will do, including your HDD. I’m waiting.
given the thought you have clearly put into this would you not suggest that any system user should not allow autorun and instead perform a thorough scan of a USB drive before using any data/executables on it?
Have you done this with your example of an infected USB drive? Did it get past the avast scan?
Basically, the questions already contains the answer. Yes, avast! puts the default set of exclusion back when all the exclusions are removed. So, if you keep one exclusion at least (could be your own one, pointing to an non-existend folder maybe, it should be kept intact.