查看: 1920|回复: 27
收起左侧

[技术探讨] windows defender的自我保护

[复制链接]
喀反
发表于 2024-3-19 19:58:46 | 显示全部楼层 |阅读模式
虽然已经4202年了,WD的自保应该已经"无懈可击"了吧?但事实并非我想象的那样,前天在吾爱找到一个能关闭/删除 WD的工具,正常联网情况下肯定被WD落地杀,但只要断网,甚至不用添加排除项,直接运行工具软件,直接可以删除WD包括安全中心,WD全程没任何反应(开了HVCI),就离谱也让我再次对WD的自保产生了怀疑
工具原地址

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
GDHJDSYDH
发表于 2024-3-20 11:24:02 | 显示全部楼层
驭龙
发表于 2024-3-20 13:50:45 | 显示全部楼层
原本我想分析一下是利用系统哪个东西干掉MD的,结果被诺顿ADVML.C干掉了,现在拉黑为Trojan gen mbt,放弃测试了,懒得关闭诺顿来分析
klub
发表于 2024-3-20 17:47:36 来自手机 | 显示全部楼层
喀反
 楼主| 发表于 2024-3-20 20:48:10 | 显示全部楼层
驭龙 发表于 2024-3-20 13:50
原本我想分析一下是利用系统哪个东西干掉MD的,结果被诺顿ADVML.C干掉了,现在拉黑为Trojan gen mbt,放弃 ...

这款工具挺厉害,以前测试过的工具就算断网,运行后还是被WD拦截的,这个全程畅通无阻
驭龙
发表于 2024-3-20 20:58:05 | 显示全部楼层
喀反 发表于 2024-3-20 20:48
这款工具挺厉害,以前测试过的工具就算断网,运行后还是被WD拦截的,这个全程畅通无阻

看你截图,应该是调用系统的功能砍掉MD的,不然不会出现这个情况

评分

参与人数 1人气 +1 收起 理由
喀反 + 1 感谢解答: )

查看全部评分

yfdyh000
发表于 2024-3-22 06:24:06 | 显示全部楼层
落地、扫描都不杀,这是合法的系统工具吧,开源的。

https://github.com/ionuttbara/wi ... oveSecHealthApp.ps1  中调用dism等系统命令删的组件。合法操作。

评分

参与人数 1人气 +1 收起 理由
喀反 + 1 感谢解答: )

查看全部评分

ANY.LNK
发表于 2024-3-23 23:47:55 | 显示全部楼层
yfdyh000 发表于 2024-3-22 06:24
落地、扫描都不杀,这是合法的系统工具吧,开源的。

https://github.com/ionuttbara/windows-defender-r ...

理论上来说微软并不认为调用DISM删除Defender是合法的,之前试过,即使断网情况下用Dism操作也会被拦截(开实时保护的情况下)

目前还不明确为何这个工具能够绕过,我一会儿试试
DisaPDB
发表于 2024-3-24 00:15:02 | 显示全部楼层
看了一眼
  1. Windows Registry Editor Version 5.00

  2. ; Enforce Disabling of Windows Defender Antivirus Policy

  3. [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\PolicyManager\default\Defender\AllowIOAVProtection]
  4. "value"=dword:00000000

  5. [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender]
  6. "PUAProtection"=dword:00000000
  7. "DisableRoutinelyTakingAction"=dword:00000001
  8. "ServiceKeepAlive"=dword:00000000
  9. "AllowFastServiceStartup"=dword:00000000
  10. "DisableLocalAdminMerge"=dword:00000001
  11. "DisableAntiSpyware"=dword:00000001
  12. "RandomizeScheduleTaskTimes"=dword:00000000

  13. [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\PolicyManager\default\Defender\AllowArchiveScanning]
  14. "value"=dword:00000000

  15. [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\PolicyManager\default\Defender\AllowBehaviorMonitoring]
  16. "value"=dword:00000000

  17. [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\PolicyManager\default\Defender\AllowCloudProtection]
  18. "value"=dword:00000000

  19. [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\PolicyManager\default\Defender\AllowEmailScanning]
  20. "value"=dword:00000000

  21. [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\PolicyManager\default\Defender\AllowFullScanOnMappedNetworkDrives]
  22. "value"=dword:00000000

  23. [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\PolicyManager\default\Defender\AllowFullScanRemovableDriveScanning]
  24. "value"=dword:00000000

  25. [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\PolicyManager\default\Defender\AllowIntrusionPreventionSystem]
  26. "value"=dword:00000000

  27. [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\PolicyManager\default\Defender\AllowOnAccessProtection]
  28. "value"=dword:00000000

  29. [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\PolicyManager\default\Defender\AllowRealtimeMonitoring]
  30. "value"=dword:00000000

  31. [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\PolicyManager\default\Defender\AllowScanningNetworkFiles]
  32. "value"=dword:00000000

  33. [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\PolicyManager\default\Defender\AllowScriptScanning]
  34. "value"=dword:00000001

  35. [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\PolicyManager\default\Defender\AllowUserUIAccess]
  36. "value"=dword:00000000

  37. [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\PolicyManager\default\Defender\AvgCPULoadFactor]
  38. "value"=dword:00000032

  39. [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\PolicyManager\default\Defender\CheckForSignaturesBeforeRunningScan]
  40. "value"=dword:00000000

  41. [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\PolicyManager\default\Defender\CloudBlockLevel]
  42. "value"=dword:00000000

  43. [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\PolicyManager\default\Defender\CloudExtendedTimeout]
  44. "value"=dword:00000000

  45. [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\PolicyManager\default\Defender\DaysToRetainCleanedMalware]
  46. "value"=dword:00000000

  47. [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\PolicyManager\default\Defender\DisableCatchupFullScan]
  48. "value"=dword:00000001

  49. [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\PolicyManager\default\Defender\DisableCatchupQuickScan]
  50. "value"=dword:00000001

  51. [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\PolicyManager\default\Defender\EnableControlledFolderAccess]
  52. "value"=dword:00000000

  53. [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\PolicyManager\default\Defender\EnableLowCPUPriority]
  54. "value"=dword:00000001

  55. [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\PolicyManager\default\Defender\EnableNetworkProtection]
  56. "value"=dword:00000000

  57. [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\PolicyManager\default\Defender\PUAProtection]
  58. "value"=dword:00000000

  59. [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\PolicyManager\default\Defender\RealTimeScanDirection]
  60. "value"=dword:00000000

  61. [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\PolicyManager\default\Defender\ScanParameter]
  62. "value"=dword:00000002

  63. [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\PolicyManager\default\Defender\ScheduleScanDay]
  64. "value"=dword:00000000

  65. [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\PolicyManager\default\Defender\ScheduleScanTime]
  66. "value"=dword:00000000

  67. [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\PolicyManager\default\Defender\SignatureUpdateInterval]
  68. "value"=dword:000000018

  69. [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\PolicyManager\default\Defender\SubmitSamplesConsent]
  70. "value"=dword:00000000

  71. [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions]
  72. "DisableAutoExclusions"=dword:00000001

  73. [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\MpEngine]
  74. "MpEnablePus"=dword:00000000
  75. "MpCloudBlockLevel"=dword:00000000
  76. "MpBafsExtendedTimeout"=dword:00000000
  77. "EnableFileHashComputation"=dword:00000000

  78. [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\NIS\Consumers\IPS]
  79. "ThrottleDetectionEventsRate"=dword:00000000
  80. "DisableSignatureRetirement"=dword:00000001
  81. "DisableProtocolRecognition"=dword:00000001

  82. [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Policy Manager]
  83. "DisableScanningNetworkFiles"=dword:00000001

  84. [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection]
  85. "DisableRealtimeMonitoring"=dword:00000001
  86. "DisableBehaviorMonitoring"=dword:00000001
  87. "DisableOnAccessProtection"=dword:00000001
  88. "DisableScanOnRealtimeEnable"=dword:00000001
  89. "DisableIOAVProtection"=dword:00000001
  90. "LocalSettingOverrideDisableOnAccessProtection"=dword:00000000
  91. "LocalSettingOverrideRealtimeScanDirection"=dword:00000000
  92. "LocalSettingOverrideDisableIOAVProtection"=dword:00000000
  93. "LocalSettingOverrideDisableBehaviorMonitoring"=dword:00000000
  94. "LocalSettingOverrideDisableIntrusionPreventionSystem"=dword:00000000
  95. "LocalSettingOverrideDisableRealtimeMonitoring"=dword:00000000
  96. "RealtimeScanDirection"=dword:00000002
  97. "IOAVMaxSize"=dword:00000512
  98. "DisableInformationProtectionControl"=dword:00000001
  99. "DisableIntrusionPreventionSystem"=dword:00000001
  100. "DisableRawWriteNotification"=dword:00000001

  101. [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Scan]
  102. "LowCpuPriority"=dword:00000001
  103. "DisableRestorePoint"=dword:00000001
  104. "DisableArchiveScanning"=dword:00000000
  105. "DisableScanningNetworkFiles"=dword:00000000
  106. "DisableCatchupFullScan"=dword:00000000
  107. "DisableCatchupQuickScan"=dword:00000001
  108. "DisableEmailScanning"=dword:00000000
  109. "DisableHeuristics"=dword:00000001
  110. "DisableReparsePointScanning"=dword:00000001

  111. [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Signature Updates]
  112. "SignatureDisableNotification"=dword:00000001
  113. "RealtimeSignatureDelivery"=dword:00000000
  114. "ForceUpdateFromMU"=dword:00000000
  115. "DisableScheduledSignatureUpdateOnBattery"=dword:00000001
  116. "UpdateOnStartUp"=dword:00000000
  117. "SignatureUpdateCatchupInterval"=dword:00000002
  118. "DisableUpdateOnStartupWithoutEngine"=dword:00000001
  119. "ScheduleTime"=dword:00001440
  120. "DisableScanOnUpdate"=dword:00000001

  121. [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet]
  122. "DisableBlockAtFirstSeen"=dword:00000001
  123. "LocalSettingOverrideSpynetReporting"=dword:00000000
  124. "SpynetReporting"=dword:00000000
  125. "SubmitSamplesConsent"=dword:00000002

  126. [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\UX Configuration]
  127. "SuppressRebootNotification"=dword:00000001

  128. [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\Controlled Folder Access]
  129. "EnableControlledFolderAccess"=dword:00000000

  130. [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\Network Protection]
  131. "EnableNetworkProtection"=dword:00000000

  132. [HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender]
  133. "DisableRoutinelyTakingAction"=dword:00000001

  134. [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Microsoft Antimalware]
  135. "ServiceKeepAlive"=dword:00000000
  136. "AllowFastServiceStartup"=dword:00000000
  137. "DisableRoutinelyTakingAction"=dword:00000001
  138. "DisableAntiSpyware"=dword:00000001
  139. "DisableAntiVirus"=dword:00000001

  140. [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Microsoft Antimalware\SpyNet]
  141. "SpyNetReporting"=dword:00000000
  142. "LocalSettingOverrideSpyNetReporting"=dword:00000000

  143. [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Reporting]
  144. "DisableEnhancedNotifications"=dword:00000001
  145. "DisableGenericRePorts"=dword:00000001
  146. "WppTracingLevel"=dword:00000000
  147. "WppTracingComponents"=dword:00000000

  148. [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\CI\Policy]
  149. "VerifiedAndReputablePolicyState"=dword:00000000
复制代码

ANY.LNK
发表于 2024-3-24 00:36:42 | 显示全部楼层
事实上,一直以来,篡改保护对于一般用户所能提供的防篡改功能是相当有限的,许多自保功能还得是企业版、MDE才能开启的,大部分设置只要有个管理员及以上权限就能改

评分

参与人数 1人气 +1 收起 理由
喀反 + 1 感谢解答: )

查看全部评分

您需要登录后才可以回帖 登录 | 快速注册

本版积分规则

手机版|杀毒软件|软件论坛| 卡饭论坛

Copyright © KaFan  KaFan.cn All Rights Reserved.

Powered by Discuz! X3.4( 沪ICP备2020031077号-2 ) GMT+8, 2024-5-3 01:24 , Processed in 0.135283 second(s), 18 queries .

卡饭网所发布的一切软件、样本、工具、文章等仅限用于学习和研究,不得将上述内容用于商业或者其他非法用途,否则产生的一切后果自负,本站信息来自网络,版权争议问题与本站无关,您必须在下载后的24小时之内从您的电脑中彻底删除上述信息,如有问题请通过邮件与我们联系。

快速回复 客服 返回顶部 返回列表