Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

COMPUTER QUESTION: How Do You Find Out What Alternate Data Streams Are Legitimate In Windows XP SP3
March 1, 2012

Posted on 03/01/2012 1:11:19 PM PST by Yosemitest



TOPICS: Computers/Internet
KEYWORDS: ads; mbrrootkit; security; streams
What do you experts suggest?
I've found Ads Spy (http://www.bleepingcomputer.com/files/adsspy.php)
1 posted on 03/01/2012 1:11:29 PM PST by Yosemitest
[ Post Reply | Private Reply | View Replies]

To: Yosemitest

By and large you don’t. If your file is legit and non-hacked it won’t be using any bad ADS, if it isn’t you’re already screwed.


2 posted on 03/01/2012 1:17:25 PM PST by discostu (I did it 35 minutes ago)
[ Post Reply | Private Reply | To 1 | View Replies]

To: discostu
Okay. Let me reverse the question.
3 posted on 03/01/2012 1:45:07 PM PST by Yosemitest (It's simple, fight or die!)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Yosemitest

Probably the file or the traffic it’s generating will ping on good (not Norton) anti-virus software.


4 posted on 03/01/2012 1:50:50 PM PST by discostu (I did it 35 minutes ago)
[ Post Reply | Private Reply | To 3 | View Replies]

To: Yosemitest

Nothing in ADS streams is critical to the functioning of Windows. It may be critical to some programs.

On the whole, however, it’s a worry about something that doesn’t affect you. I think the last ‘in the wild’ ADS bug was 2004? Somewhere around there. Too hard for the script kiddies to use, and required adaptive programming as what might work on one version wouldn’t work on another.


5 posted on 03/01/2012 2:11:37 PM PST by kingu (Everything starts with slashing the size and scope of the federal government.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: kingu
Sounds hopeful.
But a determined liberal wanting to take down and silence someone, might use ADS to infect a poster though e-mail.
What would you do? Would Comodo Complete be secure enough?
6 posted on 03/01/2012 2:47:58 PM PST by Yosemitest (It's simple, fight or die!)
[ Post Reply | Private Reply | To 5 | View Replies]

To: Yosemitest
Only if your tinfoil hat is secure.

Don't give out your email randomly and don't open spam from people you don't know. Beyond that... take your paranoia meds. There are dozens of ways someone with a lot of skills my hack your PC. But don't get too full of yourself. Hacking one single poster because your don't like a post is like punching a single raindrop because the rain is hitting you in the head. No one woud do it because it is a waste of time. You are more likely to get hit by a drunk driver. Relax.

7 posted on 03/01/2012 2:55:36 PM PST by TalonDJ
[ Post Reply | Private Reply | To 6 | View Replies]

To: TalonDJ
I'll think about relaxing.
But look at the problems FR has had saying up and online lately.
From what I've read, a lot of damage can be done thru ADS.
8 posted on 03/01/2012 3:00:19 PM PST by Yosemitest (It's simple, fight or die!)
[ Post Reply | Private Reply | To 7 | View Replies]

To: Yosemitest

The long and short of it is: Yes, it CAN happen. It is also the least likely exploit system to work, as there’s seven different flavors of ADS. You have only the same permissions as the enacting function; not like a payload program that is in the startup sequence. It is the least functional place to do it as well, as other exploits allow you access to all of the filesystem.

Does this make it useful for a hacker to exploit? Maybe - to target a specific machine in a specific location with a specific attack, knowing the flavor of OS and everything else, it MIGHT be a useful vector, but it would also be the LEAST useful vector. At some point you’re going to be transferring from your payload program to the ADS datablock, and that’s where the virus scanner will pick up the code.

Honestly, rather than mess with this stuff, I’d certainly put Linux on a USB dongle, boot up the computer in Linux, and then e-mail any and all critical files to an email account, and then reformat and use a more secure OS.


9 posted on 03/01/2012 4:05:56 PM PST by kingu (Everything starts with slashing the size and scope of the federal government.)
[ Post Reply | Private Reply | To 6 | View Replies]

To: Yosemitest
I'll think about relaxing. But look at the problems FR has had saying up and online lately. From what I've read, a lot of damage can be done thru ADS.

This is post 2,843,204 - the vast majority of the entire history of FreeRepublic is in the same database. Databases on that scale under this load are, well, taxing to any system, and it is the weight that holds down the system on the present hardware. (I'm not a fan on solving problems through bigger hardware, but it works here.)

As for an e-mail vector to attack FreeRepublic, I'd doubt there is any chance of that happening. The server is in a data center, no one is at the terminal accessing e-mail, and even if they did, it is not a Windows type environment where a number of exploits would be possible (including ADS.)

10 posted on 03/01/2012 4:09:00 PM PST by kingu (Everything starts with slashing the size and scope of the federal government.)
[ Post Reply | Private Reply | To 8 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson