Jump to content


Honorary Members
  • Content Count

  • Joined

  • Last visited

About hake

  • Rank
    True Member

Profile Information

  • Location
    Wigan, England
  • Interests
    Rugby League, Cricket

Recent Profile Visitors

7,532 profile views
  1. I never expected to see this. Bottom-Up ASLR protection is clearly worth having in Windows XP. MBAE is in active use. Mozilla Firefox 45.9 was running inside Sandboxie 3.76. The Firefox process was instantly terminated. interventions by MBAE are very rare on my Windows XP SP3 system or any other of my Windows systems for that matter. I am reassured that MBAE is prowling usefully in the backgound. Would it be fair to say that malware developers would not expect to encounter Bottom-up ASLR protection in this venerable operating system? I don't claim to have configured the most hardened XP system extant but the battlefield is littered with mines and booby traps. There are numerous layers of defence.
  2. The MBAE Advanced Settings to Prevent loading of VBScript Library have been observed to be reinstated for Windows 10.
  3. I have received an email requesting subscription payment for Malwarebytes Anti-Exploit Premium. I am told that it expires on 27 October 2019. The licence ID is 'beta version'. What happens if the subscription is unpaid? Does it stop working or does it enter a more limited mode of operation? I seem to remember that a few years ago I had a paid subsciption for MBAE Premium but then it became Beta so I let the subscription lapse. I guess that the reminder is due to a lapse in the subscription system administration.
  4. For the sake of completeness here is the MBAE screen shot for Windows 7 64bit Ultimate.
  5. Hi Pedro. Please find the screen shot of Application Hardening settings in MBAE running under Windows 10 64bit Professional.
  6. Advanced Settings for 'Prevent loading of VB Script Library' are disabled in Windows 10 but allowed in Windows 7.
  7. Dagnamit! I got confused with editing my comment. Has this forum feature been updated? I don't remember having this problem previously.
  8. To ensure that Windows 8, 8.1 and 10 have bottom-up ASLR enabled, see the following link: - Windows 8 and Later Fail to Properly Apply ASLR. Here's How to Fix.
  9. It appears that to enable bottom-up ASLR for MBAE protected Google Chrome in Windows 7, it is necessary to install EMET. Version 5.52 specifically enables system-wide ASLR which automatically enables system-wide bottom-up ASLR. In other words EMET creates the settings which produce the system-wide ASLR effects. No applications need to be individually protected by EMET so I guess that MBAE protected applications are unaffected. Process Explorer shows no results in the search for handles for emet64.dll. There is no protest by MBAE. My references are: - 1. EMET 5.52 User Guide 2. Clarifying the behavior of mandatory ASLR - Microsoft Security Response Center
  10. I have been blocked from https://noscript.net/ NoScript is a valuable protection aid for Firefox. I overrode the block.
  11. Thanks exile360. All those extra protections are signs that Malwarebytes is keeping its light under a bushel. I guess that it must have been doing this for quite a while. It would seem reasonable for MBAE to protect svchost.exe and the like as such system features are constant known quantities which are profoundly impotant for the overall security of the various versions of Windows. Are such extra protections likely to be included in MBAE or even MBAE
  12. @AndrewPP: EMET 5.52 is still useful with Windows 7. @Living_Computer: MBAE won't let me.
  13. I happily use MBAE on Windows XP SP3 running on a pre SSE2 AMD Athlon XP 3000+ processor which lacks hardware DEP. I run MBAE alongside EMET 4.1u1 but the two anti-exploit systems do not protect the same applications. EMET protects svchost.exe as well as a number of applications not protected by MBAE I also run Comodo Firewall Firewall which detects the following types of attack: Detection of Buffer Overflows which occur in the STACK memory, Detection of Buffer Overflows which occur in the HEAP memory, Detection of ret2libc attacks, Detection of corrupted/bad SEH Chains In addition, I use Avast Free 10.4.2233, OSArmor 1.4.3 and Agnitum Outpost Firewall Pro 9.3. I am confident that I am doing my due diligence to prevent my XP system from being a general security liability for others. This incarnation of Windows XP has been in use since May 2006 and has yet to experience any intrusion or malware activity. Comodo Memory Firewall can still be downloaded and is easy to install and manage. It is also useful on XP systems with hardware DEP. It was initially called Comodo Memory Guardian but some chump at Comodo had the bright idea to change the name and so confused many people. It has no firewall functionality.
  14. I have read that MBAE wil now operate with Malwarebytes Free also installed. Is this correct?
  15. Thank you exile360 for your trouble and interest. I have been trying to get my head round the uncertainty of the operation of ASLR with Windows 8, 8.1 and 10. I think that the issue is centred round the difficulty of forcing ASLR for unsupported (old) applications. There is no authoritative opinion on this subject and many comments on the web are dated around the end of 2017. The really strange thing is that Windows 7 is exempt from the issues. I use EMET 5.52 to enable bottom up ASLR for as many running processes in Windows 7 as I can without any adverse effects. Google Chrome 76 accepts injection of EMET 5.52's emet64.dll. I can thus assure myself of adequate ASLR entropy for Google Chrome in Windows 7.
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.