![]() ![]() It also protected five of the commonly attacked software programs. He added that Anti-Exploit defeated all 11 of the most commonly-used exploit kits, which are complete software packages to exploit a computer, and all 14 of the most commonly seen exploits. It works on Java exploit where EMET wouldn't," Kafeine concluded in his report. "Malwarebytes Anti-Exploit is working as expected against all widely used exploit kits. Anti-Exploit was able to stop Kafeine in every test he ran, more than 30 times over two months. To support claims about his own product, Kleczynski hired the independent exploit analysis expert known as Kafeine to try to break the software. ![]() Kleczynski asserted that EMET is "allowing through a lot of junk." As anyone running Windows with a third-party security suite knows, it wouldn't be the first time that Windows security was better handled by outside sources. "EMET is still in technical preview, and it's complicated as hell" to run, said Kleczynski said. This sounds similar to Microsoft's exploit-blocking Enhanced Mitigation Experience Toolkit, or EMET. At the time, Bustamante - who co-founded ZeroVulnerabilityLabs - said, "It is not blacklisting, not whitelisting, and not sandboxing. ZeroVulnerabilityLabs introduced the technology in Anti-Exploit as ExploitShield two years ago. Worried about giving away the keys to kingdom, Bustamante wouldn't go into further detail on how Anti-Exploit works. It blocks attempts to bypass the operating-system level security, protects against exploits executing from the computer's memory, and halts payloads that can install malware. "It detects exploits because it looks at exploit-like behavior," Bustamante said. A screenshot from exploit expert Kafeine's report on his tests of Malwarebytes Anti-Exploit. ![]()
0 Comments
Leave a Reply. |