Solved

How do you bypass program run restrictions

Posted on 2011-02-28
7
770 Views
Last Modified: 2013-12-07
Hello everyone.
I was wondering if there were any way to bypass software run restrictions. Right now I have vlc portable blocked and i want to know how some of my employees still get the program to run still.
0
Comment
Question by:chriselibama
7 Comments
 
LVL 23

Expert Comment

by:Dr. Klahn
Comment Utility
We need to know how you have the program blocked in order to field theories on how the block is being defeated.
0
 
LVL 47

Expert Comment

by:dbrunton
Comment Utility
True.  How are you blocking it.


Could they be running it from a USB stick?
0
 
LVL 16

Expert Comment

by:sjklein42
Comment Utility
Some program blocks can be defeated by simply renaming the executable.
0
Free Trending Threat Insights Every Day

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

 

Author Comment

by:chriselibama
Comment Utility
hey everyone.
its set through gpo in the software restriction policies.
i know that people have renamed it before and it worked at one time.
we use macaffe DLP to prevent usb devices.
0
 
LVL 23

Expert Comment

by:Dr. Klahn
Comment Utility
Can you take a screenshot of the block setup and post it here so that we can have a look at it?

It is possible that the block in effect works only for a single version of the program.
0
 

Author Comment

by:chriselibama
Comment Utility
unfortunately i cant right now as im on the road. But in theory though, do you have any idea how someone would do it?
why would it only block a certain version / how would i t know
0
 
LVL 23

Accepted Solution

by:
Dr. Klahn earned 250 total points
Comment Utility
why would it only block a certain version / how would i t know

This goes back to why we need to know specifically how the program is blocked.

One reliable method to match files is by comparing CRC values.  The can be named anything, which defeats file name matching, but if the CRC matches, it's the same file, the same program, and it shouldn't run.  But the downside of this is that while it's very reliable, it matches only one version of the program.

Another method is to look at the file attributes such as the manufacturer, version number, revision key, and authentication authority.  But these can be changed, so again, we need to know how you're blocking the program to speculate on how the block is being defeated.
0

Featured Post

Threat Intelligence Starter Resources

Integrating threat intelligence can be challenging, and not all companies are ready. These resources can help you build awareness and prepare for defense.

Join & Write a Comment

Can you find a fax from a vendor you saved a decade ago in seconds? Have you ever cursed your PC under your breath during an audit because you couldn’t find the requested statement or driver history?  If you answered no to the first question or yes …
If you have done a reformat of your hard drive and proceeded to do a successful Windows XP installation, you may notice that a choice between two operating systems when you start up the machine. Here is how to get rid of this: Click Start Clic…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

763 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now