Penetration Testing mailing list archives

Re: --++[Preventing the spread of USB malware]++--


From: Shreyas Zare <shreyas () technitium com>
Date: Thu, 16 Apr 2009 11:24:25 +0530

Hi Hieu,

I did only mention only autorun.inf but, in general since the file
permission only allows read & execute access, viruses which infect exe
files or make folders hidden & create a virus copy with same name with
folder icon, will also be deterred. The only folder where you give
full control to Everyone user needs to be monitored for such a
infection, rest all files are protected.

Regards,

2009/4/16 Lê Ngọc Hiếu <hieu.lengoc () gmail com>:
Hi,

It's good idea but I think that it could prevent virus from auto spreading
only. How about some kinds of virus set hidden attribute to files and
folders then create another executable file with the same name and icon that
may lead to mis-double click by users?

Just my experience.
Regards,

Hieu


-- 
("Computers have a strange habit of doing what you say, not what you
mean." - SANS Top 25 Most Dangerous Programming Errors)

Shreyas Zare
Co-Founder, Technitium
eMail: shreyas () technitium com

..::< The Technitium Team >::..
Visit us at www.technitium.com
Contact us at theteam () technitium com

Join Sci-Tech News group and get the latest science & technology news
in your inbox. Visit http://tech.groups.yahoo.com/group/sci-tech-news
to join.

------------------------------------------------------------------------
This list is sponsored by: InfoSec Institute

Learn all of the latest penetration testing techniques in InfoSec Institute's Ethical Hacking class.
Totally hands-on course with evening Capture The Flag (CTF) exercises, Certified Ethical Hacker and Certified 
Penetration Tester exams, taught by an expert with years of real pen testing experience.

http://www.infosecinstitute.com/courses/ethical_hacking_training.html
------------------------------------------------------------------------


Current thread: