NEWS
  > CATEGORIES
  LEAK TESTING
  KILL TESTING
  ADVICES
  DOCUMENTS
  REWARDS
  > IN THE WILD
  > LINKS
  > FAQ
  > TOOLS

     SCAN YOUR COMPUTER

     TEST YOUR BROWSER
December 05 2007 : Anti-Keylogger Tester (AKLT) updated to 3.0

new keylogging method added :

Someone talked to me about an apparently new keylogging method being discussed at Wilder Security Forum. This method used by the testing tool in this thread is based on GetRawInputData() API, and bypasses some HIPS (there is still fortunately HIPS detecting and blocking it).

That's the first time I hear of it, and from what we can see, for some security vendor too. However, I found references to this keylogging method back to 2005. Therefore, that could mean that malware writers are aware of it since two years, and that would explain why there is HIPS aware of it and detecting it.

I added myself this new method to AKLT with the same purpose than the last build, completeness. Moreover, AKLT does not require at all Microsoft .NET unlike the tool mentioned in the aformentioned link. This enables everyone to test their security software without the need to install third party libraries. Please note that this new method, GetRawInputData, is only available since Windows XP and newer OS such as Vista (the tests button will be greyed out on Windows 2000 and prior).

You can download the new AKLT version. Click here to download AKLT v3.0




December 04 2007 : System Shutdown Simulator mirrored on Firewall Leak Tester

new HIPS testing tool hosted :

Denis Sazonov discovered a flaw in various HIPS and created a test tool the 11/21/2007. I offered to host a mirror of his file on Firewall Leak Tester.

This tool, System Shutdown Simulator, takes the opportunity of the system shutdown timeframe where all of the applications, including security ones, are closing themselves. This timeframe can be paused and exploited. Click here to download System Shutdown Simulator




October 24 2007 : Anti-Keylogger Tester (AKLT) updated

added two known keylogging methods :

Until now, I didn't include keylogging method using global hooks, as these are widely known and covered in all of the most known security software since years. Global hooks can be created using SetWindowsHookEx() API, and depending of the kind of hook, may or may not inject a DLL into all running processes.

However, for the sake of completeness, I thought that adding the two tests would be a good idea. This way, AKLT from now offers 6 different keylogging tests, plus 2 screenshots tests. That means 8 security tests to check your security software and settings.

From the same virus bulletin article I mentioned in the previous news, among the known in the wild keyloggers, 66% use hooks, 29% use hookless/cyclical polling, and 5% use a driver. :


Global Hook - Cyclical polling - Driver based

That means that AKLT v2.5 enables you to test the behavior of 95% of the In The Wild keyloggers. For the remaining 5%, block driver loading by running a limited user account, or by using an HIPS (once a driver is loaded, it can do much more than just keylogging).

There is a new AKLT Guide which explains how to use AKLT, and what kind of results you can expect.

Click here to download AKLT v2.5




October 19 2007 : new Anti-Keylogger Tester (AKLT) version

new keylogging method :

From this viruslit.com article written in March 2007 (by Nikolay Grebennikov, Kaspersky Lab), we can see that almost 50% of the malware detected by Symantec are aimed at harvesting data from the infected computer, one of these methods being keylogging. Therefore, keylogging is a serious issue (needless to say it's even more an issue in corporations).

AKLT v2.0 is a new version adding a new keylogging function, based on GetKeyboardState() API. When I tested on my side AKLT v2.0 on September against 13 different HIPS and/or dedicated anti-keylogging software, 10 of them (77%) were failing one of the four keylogging methods, and 8 of them (61%) were failing the new method.

Failing at least one test 77%
Failing new test 61%
Passing all 23%
That is very surprising that something known for years like keylogging seems still to work sucessfuly in most of the cases.

In front of such statistics, I sent a notice the September 28 2007 to the following seven security vendor : SysSafety (System Safety Monitor), Kaspersky Lab (Kaspersky Internet Security), GhostSecurity (AppDefend), Comodo (Comodo Firewall), ISecSoft (ProSecurity), Tall Emu (OnlineArmor), and SoftSphere Technologies (DefenseWall). I have also posted a version of AKLT to Malware-Research, a private forum for security vendors.

The 3 following software were passing all of the AKLT keylogging method before I contact any security vendor : System Safety Monitor 2.4.0.619 beta, Comodo Firewall 3.0.9.229 beta, and OnlineArmor 2.1.0.9.

The 3 following security software vendors have found a fix to detect and block the new keylogging method. The fixed release is either already available or will be very shortly :
ProSecurity, DefenseWall, Kaspersky KAV/KIS.
GhostSecurity, maker of AppDefend, answered but did not give any date for the fix. SnoopFree was already failing AKLT v1.0 (DirectX test). I sent them an email for the first time, simply asking if they would plan to improve their product or not. I didn't receive any reply as of yet.

The following are failing at least one test, and were not contacted : EQSecure, ThreatFire, Advanced AntiKeylogger 3.7, Anti-Keylogger Shield 2.3, PrivacyKeyboard/Anti-Keylogger 7.4. I did not contact them for various reasons, one of them is that some are unknown to me and I don't know if I can trust them. Any of these software maker can contact me to be in my "contact list" for future tools or leaktest release. Please note that some of these dedicated anti-keylogger were randomly picked on the Internet, I have no idea if they can be trusted or not.

If you want to test yourself, download AKLT v2.0.




September 26 2007 : New document published : Securing Windows - PART II

Guide to increase your security on Windows :

I have done another guide, that you can find on the document page, which is the following of "Securing Windows - Part I" (Securing Windows - PART 2 direct link).

This document is aimed at helping you to further increase your Windows security, by adding security software and using advanced Windows security features. It is also meant to be a discussion exercise, about how much security is too much.

If you don't know how to fully secure your computer, or if you are unsuccessful at it, this guide is for you. However, please note that the method described in this guide is just one way to achieve your goal, not the only way possible. It is impossible to give the "best" universal way working for everyone and fitting every context.

As usual, if you find any error or mistake in the document, thank you in advance to contact me, for I can look into this matter.




March 14 2007 : Vista's security impact on the leaktests

New article:

The new Microsoft Operating System, Windows Vista, comes with many new security features. The question that arises is how these features will stand against the leaktests ? We can also wonder if current leaktest's tricks may simply be incompatible with Vista. Personally using Vista for more than a month, I wanted to know how secure Vista was by default.

You can read the resulting article Vista's security impact on the leaktests to discover some answers about these questions.

Of course Vista is still new and fairly recent, we are far from having discovered everything about it. As with any OS release, we can bet that interesting discoveries will be made in a near future.





March 10 2007 : new webhoster

upgrade :

I have switched again to another webhoster. The previous one had a very bad support, taking weeks to answer you, and sometimes not answering at all. Also, they had a hard time understanding why some leaktests are detected as malware whereas they are not. While at the end everything was sucessfully solved, I didn't want to stay with them.

As with any moving, some things might get lost, thus if you find any dead link or anything missing, please send me a notice.

I do not send a newsletter only for this, so it's normal if you weren't emailed.






January 13 2007 : New tool released : Anti-Keylogger Tester

Test your HIPS's anti-keylogging functionality :

Some trojans includes keylogging functionalities, which can steal confidential information you are typing, before sending them via the network. To fight this threat, many HIPS software, and also dedicated anti-keyloggers software, now provides anti-keylogger features. However, there is many ways to monitor the keyboard, and not all HIPS cover all ways to do keylogging.

Anti-Keylogger Tester (AKLT) is a tool using 3 different methods to monitor your keyboard (GetKeyState, GetAsyncKeyState, and DirectX) and enables you to check your defences. AKLT does not try to monitor your keyboard by using a global hook, nor any DLL/code injection, as these methods are widely known and covered by all security softwares I have tested.

Additionaly, AKLT provides two ways of taking screenshots, as a keylogger or a trojan could do. I am not aware of any HIPS providing screenshot protection, but in case one of your security software is claiming to provide such feature, you will be able to test it thanks to AKLT.

I have contacted and given a version of AKLT the December 31 2006 to the following security vendors : SysSafety (System Safety Monitor), Kaspersky (KIS 6.0), GhostSecurity (AppDefend), Comodo, Agnitum, ProSecurity, and OnlineArmor. I have also posted a version of AKLT program to Malware-Research, a private forum for security vendors. I was not aware of any HIPS providing a protection against the third DirectX AKLT's method, that's why I have contacted the software vendors first for a protection to be found. Agnitum and Comodo only make personal firewalls and do not offer HIPS for now, but it was just in case, to bring awarness about the issue.

The following HIPS vendors have released a version of their software including a fix to detect and block the AKLT third keylogging method. You can download them now :
ProSecurity v1.26, System Safety Monitor 2.3.0.608 beta.

The following security vendors does not have yet a fix, but wanted to express themselves about this issue :
Comodo
Comodo Firewall version 3.0, available March, will contain full HIPS functionality and will detect these tests. However, the keylogging tests you have developed do not fall within the scope of Comodo Firewall 2.3 as it was not designed to include any HIPS functionality.

Comodo Firewall 2.3 does, however, detect keylogging programs should they attempt make an outgoing connection to the internet and so prevents them from compromising user privacy.

OnlineArmor
We've tested the latest internal build of Online Armor v2 against AKLT and all of the tests described will be passed before release. We already have working code for getXXXKeystate detection and can detect (but not block yet) the DirectX keylogging. This will be corrected before release.

Kaspersky should release a beta soon fixing this issue, probably next week.


You can view and download AKLT at the following page.




November 26 2006 : New document published : Securing Windows

Guide for intermediate user :

I have written a guide, you can find on the document page, to help people to learn the basis to configure and secure their Windows. This guide does not talk at all of which application to install, which antivirus, or which firewall; but instead explain how to manually configure Windows to increase it's security. This guide talks, between other subjects, about updates, password, services, and privileges (restricted rights).

This guide is more designed for a level from beginners to intermediate, if you perfectly know how to configure Windows to lock it down, this document is not for you.

If you find any mistake in the document (grammar or technical error) please report it to me.




October 11 2006 : Agnitum Outpost v4.0 has been released

anti-leak feature added :

As you may know, Outpost v4.0 has been released recently. It is a great improvement from the previous versions, and it now has a built-in "anti-leak" feature based on the leaktests from Firewall Leak Tester.

This feature is meant to handle all known leaktests, from Agnitum's description. I'm glad there is firewall vendors out there focusing on their user's security by taking the leaktests seriously. Of course, this feature can be disabled if you don't need it.

Below is a quote from Agnitum :
We are very proud to release Outpost Firewall Pro 4.0 because Agnitum specialists have once again managed to prove their expert level in computer security. Our mission is to create high-end products and with the recent release it has been fully accomplished.

We designed the fourth version from the get-go to satisfy the top six critical security requirements for firewalls: inbound & outbound protection, program behavior monitoring, internal protection against unauthorized termination, automatic configuration for Internet-accessing apps, extensive activity monitoring features.

Our efforts have led to a 100% pass rate for all existing leaktests. That highlights the exceptional ability of Outpost Firewall Pro to withstand serious malware attacks aiming to steal personal data from a user's PC. Naturally, security-conscious folks will be looking to confirm these results independently, and in that respect we would like to thank Mr. Guillaume Kaddouch for his efforts of bringing a dedicated testing ground here at firewallleaktester.com. We hope users will like the unmatched performance of the new Outpost.


Besides the anti-leak feature, Outpost has some other great ones such as plugins against malformed DNS queries, or plugins to protect your computer from LAN attacks such as ARP spoofing. For those connected directly to the Internet, the Attack Detection plugin is able to detect portscans and various TCP attacks.

Oupost 4.0 is definitly one firewall to try if you haven't one yet or if you are not satisfied of your current one.

Finally, as a last note, another firewall, free, is also progressing well in the leaktest fight and is used by some users, it is Comodo. For whose wondering, all of the lastest firewall versions will be tested in the next leaktest testing sessions, thought I have no date yet.




October 10 2006 : Microsoft taking control back of his WGA

RemoveWGA forbidden :

Microsoft complained to my webhoster about RemoveWGA.exe hosted in my tool folder, and put pressure to make me remove it. I'm obliged to comply and have no choice about it.

I don't quite understand them as RemoveWGA is only designed to help the users who have a legit Windows copy. Moreover, RemoveWGA is now widespread and is available from many mirrors and in various P2P networks, so removing it from my website won't do that much.

They probably want to send a message, but I'm unsure if it will be really beneficial at the end. I let everyone makes his own opinion.




October 07 2006 : New test board, "Firewall termination defense" testing

38 termination methods used :

A new firewall termination test page is born !

Leaktests methods can be used to bypass silently your firewall, but what if it can be simply terminated and disabled, and then your data being sent out normally without using any leaktest trick ? Some malware in the wild are trying to terminate various Anti-Virus and Firewall softwares, so I thought it may worth to add a test for that also.

13 firewalls are tested against 38 termination methods, which means at least 500 tests done. As some tests are repeated many times to ensure the correctness of the result, this is a great ammount of work. That explains why I didn't test all known firewall available, and why I didn't use all termination tools I've found. However I plan later to add more tools and firewalls to the test bed, this time is just the begining.

I have used for the tests public termination tools freely available for anyone, thus for the firewall vendors themselves. However, as for the leaktests, all of these termination methods used are only the known ones, it probably exists some unknown and unpublished ways of termination. Always think to what might happen while securing yourself (e.g : monitoring process execution to block potential unknown threats), and not only to what is currently known .




August 1 2006 : RemoveWGA not helping piracy

piracy is illegal :

I have received some complaints from users who said that RemoveWGA was not working on their system. RemoveWGA was saying that WGA notification was not active, despites the WGA popups telling the user their Windows was pirated.

After investigation, it appears that RemoveWGA works well on legit Windows copies (it detects the WgaLogon DLL being loaded) but is unable to see the DLL on pirated Windows, hence saying that WGA notification is not active. In fact, Windows seems to cloak the DLL from RemoveWGA purposefully if it is running on a pirated copy.

At first, as I didn't know that RemoveWGA was not working only on pirated OS, I made a fix to make it to work in all cases, and I posted it on a forum. After discovering that only pirates had the problem, I quickly removed the fix and the manual steps to disable and remove the WGA notification tool on pirated Windows.

While I still think that honest people being wrongly spotted as pirate should be helped, they are a minority, and should contact Microsoft. The other real pirated copies should not receive any help. I do not support piracy, I'm strongly against it, and will stand on this.

RemoveWGA is done to help legit Windows users to remove the WGA Notification update if they installed it inadvertedly, and feel concerned about their privacy and security. It will not work on not genuine copies.

If you are running a pirated Windows, you must buy a valid and legit licence




July 29 2006 : new RemoveWGA version out

RemoveWGA 1.2 release :

This version removes cleanly both WGA Notification 'Pilot' version and 'Final' version, it should theoretically not be needed anymore to directly unload the WGA notification in live from memory and to risk a blue screen (BSOD).

If RemoveWGA finds the final WGA notification version, it "disables" the file WgaLogon.dll by preventing the SYSTEM account to access it (using the Windows file cacls.exe). After a reboot, it tries to remove the WGA notification, and only then, if it cannot do it, it offers you the brutal WGA removing.

RemoveWGA 1.2 has been successfully tested against the pilot and final version of WGA notification on both Windows XP SP2 Professional & Home Edition (clean removal).

To sume up, RemoveWGA now uses 3 different WGA removal methods, depending of the WGA version installed on your computer. The last one (BSOD) should not be used, except may be for futur WGA versions if the clean removal methods fail. If it happens, RemoveWGA will popup a warning and will ask you before trying anything.




June 30 2006 : new RemoveWGA version out

Windows Genuine Advantage Notification UPDATE :

Microsoft has released the June 27 2006 an update to it's WGA Notification package. Officially, it will phone home a lot less (not anymore every boot), and the EULA describes more clearly what is the purpose of this "update".

However, what is not told to you, is that this updated version also prevents RemoveWGA to remove the WGA Notification tool. Indeed RemoveWGA 1.02 will return an error saying "WgaLogon.dll or WgaTray.exe cannot be set for deletion at next reboot. Operation aborted".

Microsoft wants to keep control on WGA, and they provide themselves a guide to manually uninstall the WGA Notification PILOTE version: Official Microsoft Removal Guide Unsurprisingly, the method offered is complicated for a standard home user with no IT knowledge and requires 3 restarts of your computer. I do not understand the logic behind this, it would have been far easier to provide a "uninstall" button, instead of providing a guide that some clueless users won't probably be able to follow, or will simply give up.
Also, from the webpage : Important These instructions have not been tested on the general release version of the WGA Notifications. Therefore, these instructions are not supported. which probably means that lastest WGA notification update being the final release, cannot be removed with this guide ?

Finally, I release RemoveWGA 1.1 to remove the last WGA notification update. However this time, if it detects that it is blocked from doing it the proper way (unlike the previous WGA version), then it will offer you a "forced" live unloading of WGA from memory.

removing WGA notification this way will crash your computer !

Indeed, the WgaLogon.dll is unloaded from the winlogon.exe process, which crashes few seconds afterwards, after that the WGA files have been deleted. You must do a hard reset of your computer quickly after the "succesfull" popup. I'm not happy with this method, but it removes the WGA notification instantly.

YOU SHOULD NOT USE THIS METHOD IF YOU HAVEN'T BACKUPS

As with any BSOD, data loss can occurs and a check disk can be needed. If you are unsure of what you are doing, do NOT do this

I provide the RemoveWGA 1.1 version for people who wants to get rid of the WGA notification at all cost. I used it multiples time on my test computer (I wilingly crashed it many times) without any trouble. But keep in mind that halting your system in a bad state can lead to data loss. Do not come after me if you loose any data.

To finish, it's possible that the next update won't be removable by RemoveWGA, if Microsoft's wants to lock WGA down, they can. If they do, there will always be manual ways such as booting on a BartPE CD. Untill the day where the WGA notification will be mandatory (if it happens), and where uninstalling it will mean that you won't be able to install any security updates (don't worry, it's not the case yet).





June 23 2006 : new webhoster for firewall leak tester

upgrade :

I have upgraded the server where the website is hosted to a newer one able to handle more traffic. My previous webhoster wasn't able to handle the recent traffic spike caused by the RemoveWGA tool release on my website.

Everything should have been restored correctly, databases - downloads - links, but if anyway you find anything wrong (dead links, errors, etc...), please submit it to me by writing a mail at webmaster@firewallleaktester.com
It remains a minor issue due to the new server's configuration, every mail sent by firewall leak tester will have as sender address "anonymous@firewallleaktester.com".
I am working on this, but it does not affect the website functionalities. I do not wish to publish any news on the newsletter, until it's solved.

Finally, this new dedicated server costs me much more than the previous one, and donations are still appreciated (donation possible via a Paypal account or directly online with a credit card)

I wish you a good surfing.




June 10 2006 : Windows BITS service bypasses default firewall rules

BITS service opens a big hole on your computer :

1 - BITS explanation :

The BITS service is used by the automatic Windows update feature to check and download updates if available. Althought used by default only by Windows, this service can be managed/controlled by any application running.

From Microsoft :
Background Intelligent Transfer Service (BITS) asynchronously transfers files in the foreground or background, throttles the transfers to preserve the responsiveness of other network applications, and automatically resumes file transfers after network disconnects and machine restarts. Applications use the BITS application program interface (API) to create transfer jobs and to monitor the progress of jobs in the transfer queue. The BITS API is included in the Microsoft® Platform Software Development Kit (SDK).


2 - issue/consequence :

Any application can create a "job", and requests to download some files. The BITS service (included in svchost.exe in WindowsXP, and should be services.exe in Windows 2000) will then act as a proxy, and will download the files and save them where requested. From your firewall point of view, it is the service which is accessing the network, not the application who asked the file.

This issue is NOT a vulnerability, this is a Windows feature, and the BITS service behaviour is expected to be like this. This is also NOT a firewall vulnerability. By default you may have fully allowed svchost.exe (access to ports 80 and 443) to access the Internet (if you enabled automatic Windows update), but knowing this issue, you may now consider to reconfigure it.

The original discoverer who reported this issue to me (the April 28), is Tim Fish (info@fi5h.co.uk).

3 - testing yourself :

If you wish to test it yourself, you can download the BITSADMIN.EXE utility from Microsoft : Windows XP Service Pack 2 Support Tools

Then, you can type the following commands in a command prompt :
bitsadmin /create JOBNAME
bitsadmin /addfile JOBNAME http://www.firewallleaktester.com/tools/wwdc.exe c:\wwdc.exe
bitsadmin /resume JOBNAME
bitsadmin /info JOBNAME
bitsadmin /complete JOBNAME


Once the utility downloaded, if you do not want to type all of these lines many times while testing, you can download the following GUI I quickly did : BITS_tester.exe.
Put both files BITS_tester and BITSADMIN in the same folder before executing the tool (not on your desktop, seems not to work there).
BITS_tester is NOT a leaktest, it is simply a GUI to control the utility from Microsoft.

4 - Solution :

The only way to prevent abuses is to restrict in your firewall the IPs svchost.exe (or services.exe) is allowed to access. On my side, I need to allow these IP ranges (text file) :




5 - Example (with Jetico) :

The following is done with Jetico, but it can be done with any firewall. Report to you help file or your support forum if you do not know how to create network rules with your firewall.

You first need to create a new table , inside which you have to add the following network rules (original picture) :


Then, in the Table, add a line like this :


Now, if you execute the BITS_tester, Jetico will ask for network access for both BITS_tester and BITSADMIN, and will at the end (and it should be the case for every firewall) ask about outbound connection to firewallleaktester :


6 - Conclusion :

You should never "Allow all" an application, even if you trust it, and especially for the system processes. Always restrict it to the ports AND IP addresses it needs, it includes your ISP DNS servers IPs for instance. SVCHOST.EXE on WindowsXP is a proxy for many features and it can be abused (like with this BITS issue, and also remember the DNStester leaktest). Consequently you must restrict it tightly to not open doors to potential malwares. Every firewall, coming with a rule for svchost which allows ports 80 and 443 to every IP, can be bypassed.

Also notice that the IP ranges given may not be complete, it might be possible that on your country svchost needs to access other ranges. If your firewall warns you about an access to an IP not being in the given ranges, to know the range to which the IP belongs, you can use the "IPWHOIS Lookup" from the website http://www.dnsstuff.com/. Simply enter the IP in the box, the website will give you the associated IP range and CIDR.

Until now, I've talked only about downloading, but the BITS service (last version) can be used to upload files as well if you have a machine where the IIS web server service is running.

As a side note, about those who say you shouldn't be infected in the first place, they are of course right. But a firewall is still needed to control legit Windows components or unwanted application behavior (e.g MS Word acessing the net). Also, in case something got planted in your PC, having restricted anything to what it needs only will mitigate the consequences. It's like the airbag of your car, theoretically you shouldn't need it, because you drive well and not too fast. But if anyway you have an accident, having an airbag will decrease the damages.

Finally, disabling all together the automatic update service and BITS service is not a solution. Indeed, a malware could start them back before using them. I do not advise at all to disable Automatic Windows Updates, but if you go that way, do not forget to also block svchost.exe or services.exe in your firewall (if you are using DHCP, create a rule to allow local port 68 to communicate in UDP to the remote port 67, IP 255.255.255.255).





June 8 2006 : two new leaktests added

Comodo Parent Injection Leak Test & PCFlank Leaktest :

I have added two leaktests to the site, CPIL leaktest from COMODO which released by the way the version 2 of their firewall (being a lot better regarding leaktests, from them), and PCFlank leaktest from PCFlank, well known security website.

The methods used are known (DLL/Code injection, OLE browser manipulation), but they are used slightly differently, sometimes not handled by the various personal firewalls.

However, I do not have the time currently to test them against every firewalls, I have consequently not updated the results board.




May 21 2006 : KIS & KAV 6.0 released

Antivirus and Firewall available :

The Firewall Leak Tester "Best Choice" awarded Kaskerspey Internet Security 6.0 (KIS 6.0) was commercially released the May 15 2006, as well as Kaspersky Antivirus 6.0. Both are available in trial or commercial version at : http://www.kaspersky.com/
They were previously in beta stage. The last commercial build is the 6.0.0.300

The other "Best Choice" awarded software, Ghost Security Suite (AppDefend & Regdefend), is still in beta for now, I have no news and no expected release date as of now.





News Archive



Home      News      Contact      Online form      Mailing list