Avast WEBforum

Other => General Topics => Topic started by: polonus on December 30, 2005, 11:09:23 PM

Title: Known and unknown Win Autostart Methods
Post by: polonus on December 30, 2005, 11:09:23 PM
Hi malware fighters,

It is good for us what are methods for Windows autostart, lot of trojans etc. use these, here they are presented:
http://newdata.box.sk/2001/may/auto.txt

Greets,

polonus
Title: Re: Known and unknown Win Autostart Methods
Post by: Squidhead on December 31, 2005, 05:25:25 AM
nice info ;D

i love this stuff,,for years i would look at the multitude of system folders and wonder at what they did ??

im pasting it now 8)
regards

Title: Re: Known and unknown Win Autostart Methods
Post by: bob3160 on December 31, 2005, 06:32:47 PM
Quote
im pasting it now
Why past when it's esier to download.
Rightclick on the link and then select Save Target as that will allow you to download the file.
Title: Re: Known and unknown Win Autostart Methods
Post by: igor on December 31, 2005, 06:53:23 PM
Just keep in mind that this list is far from complete.
Windows are very complicated system, and people keep finding new ways to make it run a (malicious) piece of code automatically.
Title: Re: Known and unknown Win Autostart Methods
Post by: polonus on December 31, 2005, 07:50:14 PM
Hi Igor,

I am not stating there that the list is complete, it is just to let people think about what can take place.
How does malware get onto a computer? Well with everything that can be used to transmit data. All that can transport data, can transport malicious nodes (mail, CD, DVD, diskette, active modem, ISDN, Network Cable, remote drives etc. etc.)
However malware must be run to turn into malicious, ergo the recipe must be prepared to be poisonous, this is done through vulnerabilities in an OS or by trick, (buffer-overflow - cross-site scripting-SQL injection, SQL manipulation) but the biggest vulnerability always sits in front of the keyboard, and also developers of software make errors. This is the human factor.

 How you can be protected against this?
preventing programs from executing malware automatically. Browser pop-ups and messages should be critically met and addressed by the user, and not just clicked away, never execute or run things that you cannot trust or could know that it cannot be trusted. Never use any programs you do not really need. Check all software that could run or execute non-trusted data (mail, office programs like Word etc.). Do not use software with  bad security policy and do not use programs with full user rights if you do not absolutely need to use Admin Rights.

These are some of the things users can do the prevent being infested,at least to minimize the risk of being infested.

polonus
Title: Re: Known and unknown Win Autostart Methods
Post by: Mastertech on January 02, 2006, 02:57:47 PM
This list is very old and misses many of the new ways malware is launched, you are much better off using a utility like Autoruns (http://www.sysinternals.com/Utilities/Autoruns.html) to see what is starting where. It is much more comprehensive and very easy to use. This utility also lets you look per user.
Title: Re: Known and unknown Win Autostart Methods
Post by: CharleyO on January 02, 2006, 06:48:39 PM
***

Another useful utility program to see what starts up at the beginning is What's Running which can be found at ... www.whatsrunning.net/ (http://www.whatsrunning.net/) ... and it is free for personal use. Click on the Startup tab at the top. Should you find something running that should not be, right clicking a listing brings up a menu for controlling the item. Be careful, though, you do not want to stop the program(s) you really need!


***
Title: Re: Known and unknown Win Autostart Methods
Post by: bob3160 on January 02, 2006, 07:49:24 PM
There is also Online Process checker which might come in handy.
More info can be found in HERE (http://home.comcast.net/%7Ebob3160TheForum/HighlyRecommended11-16-07-11-04.html)