Windows Defender Firewall

Discussion in 'other firewalls' started by Mr.X, Oct 7, 2017.

  1. Mr.X

    Mr.X Registered Member

    Joined:
    Aug 10, 2013
    Posts:
    5,110
    Location:
    .

    https://docs.microsoft.com/en-us/windows/access-protection/windows-firewall/windows-firewall-with-advanced-security
    https://docs.microsoft.com/en-us/windows/access-protection/windows-firewall/configure-the-windows-firewall-log
    https://docs.microsoft.com/en-us/windows/access-protection/windows-firewall/windows-firewall-with-advanced-security-deployment-guide


    Mostly old news, buy I didn't know. The new name is what I'm talking about. Sounds to me like an hybrid, lol.
     
    Last edited: Oct 7, 2017
  2. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,644
    Location:
    U.S.A.
    WD firewall is an enterprise extension of consumer based Win firewall:
    https://docs.microsoft.com/en-us/wi...ewall-with-advanced-security-deployment-guide

    As applicable for most corp. native Win security solutions, it is group policy based.
     
  3. Mr.X

    Mr.X Registered Member

    Joined:
    Aug 10, 2013
    Posts:
    5,110
    Location:
    .
    Thanks. I've included your ref link into the first post.
     
  4. JRViejo

    JRViejo Super Moderator

    Joined:
    Jul 9, 2008
    Posts:
    104,127
    Location:
    U.S.A.
    Thought the below was interesting enough to resuscitate this old thread.
    Windows Defender Firewall critique Part 1 by cruelsister: https://www.youtube.com/watch?v=J8icGPr0YKQ
     
  5. alexandrud

    alexandrud Developer

    Joined:
    Apr 14, 2011
    Posts:
    2,515
    Location:
    Romania
    Nothing really new. Everyone knows that outbound filtering is disabled by default in Windows Firewall. These attempts will be blocked once you enable outbound filtering. How do you know if something was blocked? By checking the Security event log or by using a 3rd party software which adds this functionality (I might know one). The probability that a malware will go ahead and just disable Windows Firewall is pretty low since this is too obvious to the user.
     
  6. cruelsister

    cruelsister Registered Member

    Joined:
    Nov 6, 2007
    Posts:
    1,686
    Location:
    Paris
    As noted, Part 1 is the basic. Part 2 will address your point.
     
  7. JRViejo

    JRViejo Super Moderator

    Joined:
    Jul 9, 2008
    Posts:
    104,127
    Location:
    U.S.A.
    Windows Defender Firewall critique Part 2 by cruelsister: https://www.youtube.com/watch?v=UuNXbhdmHRI
     
  8. wolfrun

    wolfrun Registered Member

    Joined:
    Jul 26, 2009
    Posts:
    707
    Location:
    North America
    Thanks JR for posting cruelsister's video. I watch everyone of her videos in including the comodo firewall ones, with her settings which I use.:thumb:
     
  9. EASTER

    EASTER Registered Member

    Joined:
    Jul 28, 2007
    Posts:
    11,493
    Location:
    U.S.A. (South)
    Yes Thanks @JRViejo - Watched and commented.

    Frankly reminds of watching a Windows XP or Vista onward demonstration of how fast WF CAN go down and become rendered wide open for malicious traffic and all the nefarious goods that go along with it. And more room for the infiltrators to probe.
     
  10. alexandrud

    alexandrud Developer

    Joined:
    Apr 14, 2011
    Posts:
    2,515
    Location:
    Romania
    This second video is very misleading. See that * from the title bar? It means that xplorer2 file manager was executing with elevated privileges. That shortcut DANGER.exe (notice the shortcut overlay) is executed with admin privileges. Evidently, any software with administrative privileges can disable Windows Firewall. This is nothing new, it is the same since Windows Vista. However, this can be prevented by using a 3rd party software which adds this functionality (I might know one).

    By the way, which command did you use for that shortcut? netsh advfirewall set allprofiles state off ?

    upload_2024-9-1_23-27-28.png

    I do not agree with the conclusion of this video "Much better to use a 3rd party firewall of your choice". If you have administrative privileges, I am pretty sure you could disable any software firewall with much or less effort.
     
  11. JRViejo

    JRViejo Super Moderator

    Joined:
    Jul 9, 2008
    Posts:
    104,127
    Location:
    U.S.A.
    You're both welcome! Take care.
     
  12. cruelsister

    cruelsister Registered Member

    Joined:
    Nov 6, 2007
    Posts:
    1,686
    Location:
    Paris
    No, Xplorer2 was not run as Administrator. The only reason the file was executed from there in this video was that there are a few on MT that feel that running files from the Desktop is somehow questionable. And the netsh command (by itself) must be run (on Win11) elevated; although with powershell the termination

    But this attack is certainly nothing new and has been used for years by malware. The point was not to showcase the malware, but to demonstrate that trusting WF is not advised and added Rules to mat not provide the protection assumed.
     
    Last edited: Sep 1, 2024
  13. Jan Willy

    Jan Willy Registered Member

    Joined:
    Jan 29, 2021
    Posts:
    280
    Location:
    Netherlands
    What can do the firewall on the router/modem?
     
  14. EASTER

    EASTER Registered Member

    Joined:
    Jul 28, 2007
    Posts:
    11,493
    Location:
    U.S.A. (South)
    If you will excuse me @cruelsister i'm sorry that a current gang (not everyone) of MT members seem to delight to scoff at your video demonstrations with overloads of wasted ridicule which they take every chance to marginalize the valuable educational ideas you take pains to present clear and concise as possible,

    Don't be dissuaded - Those videos do such a lot for anyone/many who makes time to read from the research and hard testing's which are meant to give a clearer picture into what can, or may or may not offer user's the big picture. :cool:
     
  15. alexandrud

    alexandrud Developer

    Joined:
    Apr 14, 2011
    Posts:
    2,515
    Location:
    Romania
    I also use xplorer2 and the only time when the * is displayed in the title bar is when I execute it with elevated privileges, otherwise it does not appear. Since this appears in the video, xplorer2 was not executed as a standard user account.

    What command which does not require elevated privileges did you use to disable Windows Firewall? I was expecting for the second video to see some technique that allows an unprivileged process to disable Windows Firewall, like impersonating a process, injecting code into a process, something similar. It looks that you just executed a shortcut of something which we don't even know what does. Were you able to disable Windows Firewall without elevated privileges? That would be indeed interesting. Thank you.
     
  16. Acadia

    Acadia Registered Member

    Joined:
    Sep 8, 2002
    Posts:
    4,349
    Location:
    US
    :thumb:
    Acadia
     
  17. wolfrun

    wolfrun Registered Member

    Joined:
    Jul 26, 2009
    Posts:
    707
    Location:
    North America
    Totally agree. Keep up the good work Sis. :thumb:
     
  18. cruelsister

    cruelsister Registered Member

    Joined:
    Nov 6, 2007
    Posts:
    1,686
    Location:
    Paris
    No, absolutely not. One needs elevation to disable WF; although this can be simply done with powershell, python is more elegant and preferable in coding malware.

    But the point of the video was NOT the malware (which is unique only in that for the sake of brevity it was compiled to show how WF can be disabled and that obsessing over Rules would not matter/

    Although many here are fully aware of these things, even more are not (how often is heard that WF is enough?). Alternatives to WD exist, work well, and are not so readily disabled or targeted. If discussions about these alternatives start, then the video has achieved its goal.
     
  19. cruelsister

    cruelsister Registered Member

    Joined:
    Nov 6, 2007
    Posts:
    1,686
    Location:
    Paris
    Thanks for that! It is appreciated! But as I noted in a previous video, "The Dogs may Bark, but the Caravan travels on".
     
  20. wat0114

    wat0114 Registered Member

    Joined:
    Aug 5, 2012
    Posts:
    4,097
    Location:
    Canada
    So that's how you did it :D

    Of the actively developed alternatives I've tested recently, I unfortunately don't like any of them :(

    I'd really like to know, sorry I'm not demanding haha, if your test succeeds using Andy Ful's WHHL v1.1.1.1, with SWH "On" and WDAC set to "On", and if that succeeds, then please try with WDAC set to "IAC".
     
  21. Brummelchen

    Brummelchen Registered Member

    Joined:
    Jan 3, 2009
    Posts:
    6,206
    tests are nice, but also a python driven malware has to reach a (my) system. i dont have doubts on the results, but i dont take them for real as it has to bypass several instances first.
     
  22. cruelsister

    cruelsister Registered Member

    Joined:
    Nov 6, 2007
    Posts:
    1,686
    Location:
    Paris
    Python was just my preferred method to have this file run as Admin There are many, many ways to do this without Windows making a fuss. I didn't bother to utilize UAC in this video as I have done a few past videos about it (eg:hxxps://youtu.be/pBt6GDAUTSk).

    (From Microsoft :"User Account Control (UAC) is a Windows security feature designed to protect the operating system from unauthorized changes. When changes to the system require administrator-level permission, UAC notifies the user, giving the opportunity to approve or deny the change. UAC improves the security of Windows devices by limiting the access that malicious code has to execute with administrator privileges").


    Point being, what was shown in this video wasn't in any way magic, just same old malicious thing.
     
  23. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,644
    Location:
    U.S.A.
    Another way to disable Win firewall using PowerShell courtesy of Microsoft;

    Set-NetFirewallProfile -Profile Domain,Public,Private -Enabled False
    Or, just add a firewall rule for your malicious .exe;

    New-NetFirewallRule -DisplayName "Allow Inbound Telnet" -Direction Inbound -Program %SystemRoot%\System32\tlntsvr.exe -RemoteAddress LocalSubnet -Action Allow
    https://learn.microsoft.com/en-us/w...l/configure-with-command-line?tabs=powershell

     
  24. EASTER

    EASTER Registered Member

    Joined:
    Jul 28, 2007
    Posts:
    11,493
    Location:
    U.S.A. (South)
    Apparently Not on Win 11-Or at least with that simple line code.
    sshot-2024-09-02-16-56-55.jpg
     
  25. wat0114

    wat0114 Registered Member

    Joined:
    Aug 5, 2012
    Posts:
    4,097
    Location:
    Canada
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.