SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Pastimes : Computer Learning

 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext  
To: Junkyardawg who wrote ()5/14/2000 1:29:00 AM
From: mr.mark   of 110652
 
i have excerpted items 2 thru 6 from fred langa's "SPECIAL EXPANDED SECURITY COVERAGE!" mailing on 5/11/00, having to do with scripts....

2) Speaking of Free: ZoneAlarm Adds "MailSafe"
3) Free Tool To Disable Several Script Types At Once
4) Manually Deactivating *Any* Script Type
5) A Free Scripting "WatchDog"
6) OK, But What About Online Scripting?


2) Speaking of Free: ZoneAlarm 2.1.25 Adds "MailSafe"

In the wake of the "Luv Bug" email worm/virus that went around last week,
ZoneLabs has cranked out a new version of ZoneAlarm, their free-for-
personal-use Firewall.

ZoneAlarm 2.1.25 builds on the improved security of 2.1.18 and adds
"MailSafe," which is ZoneLabs' term for the ability to intercept Visual
Basic Script attachments in e-mail:

"ZoneAlarm MailSafe detects Visual Basic Script attachments and
alerts the user to their presence. At that point, the user can
choose to open the attachment, to delete the email or to check
further on the validity of the email and the attachment. Since
most users have no need for receiving attachments in the form of
Visual Basic scripts, users should be suspicious of such
attachments. Examples of recent high profile, and highly
damaging, email-borne viruses written in Visual Basic Script
include the 'Love Bug' virus and its multiple variants"

In the new version of ZoneAlarm, MailSafe is active by default; you can
toggle it on and off via a check box in the Security Panel.

You can grab a copy of the new version at zonelabs.com
IMPORTANT NOTE: MailSafe only detects VBScript (.vbs) attachments and not
other types of script attachments. As such, it's a useful but incomplete
solution to the problem of hostile attached scripts. We'll show you how to
handle other kinds of scripts in the next few items in this issue; one or
more of these items should be just right for providing the level of
security you want against hostile scripts.

Please read this issue all the way through before you decide what to use.



3) Free Tool To Disable Several Script Types At Once

Windows uses file "associations" in order to know what applications to use
with various file types. Almost all file types have an association. For
example, DOC files are associated with your word processor; TXT files are
associated with NotePad or your simple text processor, HTM files are
associated with your web browser, and so on.

Similarly, scripts that run locally on your PC (like the Luv Bug script)
are associated with a specific application to run them---often the
"Windows Scripting Host," but there are other script-running apps, too.
The Cerberus Security Team in the UK (see cerberus-infosec.co.uk )
has developed a quick-and-dirty way to "un-associate" the
most common script types (VBS, VBE, WSF, WSH, JS and JSE) in the Windows
registry. This leaves the scripts unchanged, but prevents Windows from
knowing which application to use to run them so Windows can't do anything
with the scripts. If you or a malicious app tries to run a script, you'll
simply get the "Open With?" dialog. You can then can use something like
NotePad to see what a script is going to do before you delete it or
manually tell Windows how to run it (e.g. with the Windows Scripting
Host).

You can get Cerebus' tool for free at cerberus-infosec.co.uk .

But note that it has three major limitations: First, file associations can
change, so unassociating script file types today may not mean they'll
still be unassociated the next time you try to run a script--- it's not a
permanent fix. Second, it's specific to just the file types listed above
(VBS, VBE, WSF, WSH, JS and JSE). And third, it's quite heavy-handed, just
whacking a bunch of associations, wholesale.

The next items help address those deficiencies.



4) Manually Unassociating/Deactivating *Any* Script Type

I was going to write out this process myself, but reader Hal Adam beat me
to it:

Hi Fred: If you are concerned about viruses (actually worms)
like the recent "I love you" worm or the so called mutants of
this worm then there is a way to protect yourself against all
the mutants and any other file attachments which have file
extensions of .vbs or .vbe EVEN if you accidentally "open" the
attachment.

This is even more important since this worm was sent in source
form. That means many people may have saved a copy of the actual
text of the computer instructions (like yours truly :) ). The
text instructions are Visual Basic Source code and thus are
easily modifiable and thus many so called "mutants" may be
easily created. So here is my suggestion about how to protect
yourself from file attachments of this type:

1) Double click on the "My computer" icon.

2) Click on View followed by "Folder Options.." (NT has options
only).

3) Click on the "File Types" tab.

4) Scroll down the "Registered file types" to 'VBScript file"
and click on it (to select it).

5) Click the "Edit" button.

6) Click on action "Edit" (to select it)

7) Click on "Set Default" button. Edit should now be in bold
print.

8) Click on action "Open" (to select it)

9) Click on "Edit .." button.

10) The field "Application used to perform action:" should be
selected (ie text highlighted by blue).

11) Press both the Control and C keys to copy the selected text
to the clipboard.

12) Press the "Cancel" button.

13) Press the "New.." button.

14) Click your mouse pointer in the "Action:" field and type in
"Run" (without quotes)

15) Click your mouse pointer in the "Application to perform
action" field and press both the Control and V keys to paste the
contents of the previously copied clipboard item into the field.

16) Click on the "OK" button.

17) Click on action "Open" (to select it)

18) Click on the "Remove" button.

19) If you are asked if you are sure, reply yes.

20) Click on "Close" button. [Before closing the dialog box,
make sure the "Confirm Open After Download" and "Always show
extension" boxes are checked.---FL]

Steps 5 to 20 may be repeated for Registered file type of
"VBSCript Encoded File". [or other types of script files, too---
FL]

Thanks, Hal! What the above does is first set the default action for these
scripts to "edit," so if you click on (say) a VBS file, it opens in
NotePad instead of running. You can thus automatically view the script
contents to see if it's something you really want to run. If it's OK, you
can then RIGHT CLICK on the script file and manually select the RUN
command you created in steps 13-16; and the script will then run normally.

But, as Hal pointed out in his email to me, "This is NOT 100% foolproof
however, since some software installations may add an OPEN Action for .VBS
files...so one needs to check the above settings once in a while to see if
they are still correct. If you have not installed any additional software
however, then you are totally protected against file attachments which end
in a file extension of .vbs or .vbe [or other extensions you process this
way---FL]."

I like Hal's approach because it gives you total control. However, it can
be a lot of work to alter many file types manually; and seeing the
script's contents in NotePad is useful only if you have some idea of
script programming. (Scripts aren't hard to figure out, but can be
confusing if you've never seen one before.)

The next item shows you an easier, more automated method of accomplishing
much the same thing.


5) A Free Scripting "WatchDog"

Within a few days of the Luv Bug outbreak, the folks at WinMag posted
"WatchDog," a free app that automatically does much of what Russ' manual
method accomplishes (see item above).

"Watchdog will, with your consent, become the default program
for Visual Basic Script (VBS) and other scripting files. When
you launch one of these files, WatchDog will look it over and
warn you of any possible security risks. You can then determine
whether the program is supposed to be taking these actions and
how to proceed. An install script that copies files to a
specified location and makes a few Registry edits, for example,
might raise some flags for file copying and Registry writing,
but it could still be legitimate. Alternately, if WatchDog
reports that that `love letter' you just received in your e-mail
inbox will overwrite files and access Microsoft Outlook, you
might want to steer clear."

It's cool, free, and effortless to use; you can configure it (with just a
couple clicks) to monitor any or all of the following file types: VBS,
VBE, WSF, WSH, JS and JSE.

I have Watchdog on my system; coupled with Hal's manual method, I can now
easily monitor and control the actions of just about any script that runs
locally.

Grab a copy of Watchdog at winmag.com



6) OK, But What About Online Scripting?

All the above are geared towards the specific case of a hostile script
running on your local system--- the Luv Bug scenario. What about scripts
that run from the web, such as from within web sites you visit? Unlike the
Luv Bug, these aren't downloaded as separate, stand-alone files; and you
don't click on them because they run themselves.

Registry guru John Woram (see langa.com )
cooked up a couple of Registry patches that let you easily toggle
scripting on or off in Internet Explorer's "Internet Zone"--- or in any
other zone. Placing these tiny files on your desktop and clicking them as
needed is far simpler than the manual way to turn IE's scripting on or off
by hand: Without John's cool tools, you have to click to File then Tools
then Internet Options then Security then Custom, then scroll down to find
Scripting, and then click Enable or Disable. John's trick is much easier.

There are two ways to get John's files. You can download them from
langa.com , or you can create them on your system by
opening NotePad and copying/pasting (or typing) the following four lines
of text (line two is blank) between the "----". Don't copy the "----"
because they're simply to show you where the files start and end.

To DISABLE scripting in the Internet Zone:
-----------------------
REGEDIT4


[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\InternetSettings\Zones\3]
"1400"=dword:00000003
-----------------------


To ENABLE scripting in the Internet Zone:
-----------------------
REGEDIT4


[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\InternetSettings\Zones\3]
"1400"=dword:00000000
-----------------------


In each case, save the file with a REG file extension--- ENABLE.REG and
DISABLE.REG, for example.

John points out that if you also want to toggle scripting in other Zones,
simply create new files exactly as above, except that you change the
reference to "...\Zones\3]" as follows

For your Local Intranet, use "...\Zones\1]"
For your Trusted Sites, use "...\Zones\2]"
For the Internet Zone, use "...\Zones\3]"
For your Restricted Sites, use "...\Zones\4]"

Thanks, John!
Report TOU ViolationShare This Post
 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext