Melih
November 15, 2008, 7:00pm
#1
Updated: 27 November 2008
Hi Everyone
In order to make sure everything is easily found, lets put the results of our test results to this thread. So pls go ahead and report back your test results here and lets have at least 2 or more people confirm the results before we can update our results. Then we can put these results at testmypcsecurity.com for everyone’s benefit.
Here are the product list i have got from testmypcsecurity. by all means if you are testing other products pls include it here.
These scores are out of 340. The highest that can be achieved is 340
Product Result
Comodo Internet Security --------------->340/340
Kaspersky Internet Security ------------->270/340
Agnitum Outpost Firewall Pro ------------>250/340
Jetico Personal Firewall
Sunbelt Personal Firewall --------------->50/340
Avira Premium Security Suite ------------>90/340
Online Armor Personal Firewall ----------->290-340/340
Online Armor Free ---------------------->290-340/340
Norton Internet Security 2009 ---------->50/340
BitDefender Internet Security ----------->20/340
ZoneAlarm Pro Firewall ------------------>220/340
ZoneAlarm Free Firewall ----------------->40/340
Iolo Personal Firewall
Panda Internet Security 2009 ------------>20/340
GoldTach Personal Firewall --------------->40/340
AVG AntiVirus Plus Firewall -------------->20/340
Spyware Terminator 2.5 ----------------->80/340
F-Secure Internet Security 2009 --------->20/340
DefenseWall ---------------------------->300/340
Thank you
Melih
PS: Mods: pls feel free to add the results to this post so that we have one place for all results.
Here is mine running CIS with proactive security:
COMODO Leaktests v.1.1.0.1
Date 09:51:02 - 16/11/2008
OS Windows XP SP3 build 2600
Hijacking: ActiveDesktop Protected
Hijacking: AppinitDlls Protected
Hijacking: ChangeDebuggerPath Protected
Hijacking: StartupPrograms Protected
Hijacking: SupersedeServiceDll Protected
Hijacking: UIHost Protected
Hijacking: Userinit Protected
Hijacking: WinlogonNotify Protected
Impersonation: BITS Protected
Impersonation: Coat Protected
Impersonation: DDE Protected
Impersonation: ExplorerAsParent Protected
Impersonation: OLE automation Protected
InfoSend: DNS Test Protected
InfoSend: ICMP Test Protected
Injection: AdvancedProcessTermination Protected
Injection: APC dll injection Protected
Injection: CreateRemoteThread Protected
Injection: DupHandles Protected
Injection: KnownDlls Protected
Injection: ProcessInject Protected
Injection: Services Protected
Injection: SetThreadContext Protected
Injection: SetWindowsHookEx Protected
Injection: SetWinEventHook Protected
Invasion: DebugControl Protected
Invasion: FileDrop Protected
Invasion: PhysicalMemory Protected
Invasion: RawDisk Protected
Invasion: Runner Protected
RootkitInstallation: ChangeDrvPath Protected
RootkitInstallation: DriverSupersede Protected
RootkitInstallation: LoadAndCallImage Protected
RootkitInstallation: MissingDriverLoad Protected
Score 340/340
offchu
November 15, 2008, 7:32pm
#3
COMODO Leaktests v.1.1.0.3
Date 21:31:38 - 15.11.2008
OS Windows XP SP3 build 2600
RootkitInstallation: MissingDriverLoad Protected
RootkitInstallation: LoadAndCallImage Protected
RootkitInstallation: DriverSupersede Protected
RootkitInstallation: ChangeDrvPath Protected
Invasion: Runner Protected
Invasion: RawDisk Protected
Invasion: PhysicalMemory Protected
Invasion: FileDrop Protected
Invasion: DebugControl Protected
Injection: SetWinEventHook Protected
Injection: SetWindowsHookEx Protected
Injection: SetThreadContext Protected
Injection: Services Protected
Injection: ProcessInject Protected
Injection: KnownDlls Protected
Injection: DupHandles Protected
Injection: CreateRemoteThread Protected
Injection: APC dll injection Protected
Injection: AdvancedProcessTermination Protected
InfoSend: ICMP Test Protected
InfoSend: DNS Test Protected
Impersonation: OLE automation Protected
Impersonation: ExplorerAsParent Protected
Impersonation: DDE Protected
Impersonation: Coat Protected
Impersonation: BITS Protected
Hijacking: WinlogonNotify Protected
Hijacking: Userinit Protected
Hijacking: UIHost Protected
Hijacking: SupersedeServiceDll Protected
Hijacking: StartupPrograms Protected
Hijacking: ChangeDebuggerPath Protected
Hijacking: AppinitDlls Protected
Hijacking: ActiveDesktop Protected
Score 340/340
[attachment deleted by admin]
subset
November 15, 2008, 8:04pm
#4
Hi,
without testing guidelines all results a pretty meaningless.
Admin? LUA? Default program settings? Highest security settings?
You should really try to bring this to a more mature level, or it ends in another farce.
Cheers
system
November 15, 2008, 11:48pm
#5
COMODO Leaktests v.1.1.0.3
Date 10:41:23 AM - 11/16/2008
OS Windows XP SP3 build 2600
RootkitInstallation: MissingDriverLoad Protected
RootkitInstallation: LoadAndCallImage Protected
RootkitInstallation: DriverSupersede Protected
RootkitInstallation: ChangeDrvPath Protected
Invasion: Runner Protected
Invasion: RawDisk Protected
Invasion: PhysicalMemory Protected
Invasion: FileDrop Protected
Invasion: DebugControl Protected
Injection: SetWinEventHook Protected
Injection: SetWindowsHookEx Protected
Injection: SetThreadContext Protected
Injection: Services Protected
Injection: ProcessInject Protected
Injection: KnownDlls Protected
Injection: DupHandles Protected
Injection: CreateRemoteThread Protected
Injection: APC dll injection Protected
Injection: AdvancedProcessTermination Protected
InfoSend: ICMP Test Protected
InfoSend: DNS Test Protected
Impersonation: OLE automation Protected
Impersonation: ExplorerAsParent Protected
Impersonation: DDE Protected
Impersonation: Coat Protected
Impersonation: BITS Protected
Hijacking: WinlogonNotify Protected
Hijacking: Userinit Protected
Hijacking: UIHost Protected
Hijacking: SupersedeServiceDll Protected
Hijacking: StartupPrograms Protected
Hijacking: ChangeDebuggerPath Protected
Hijacking: AppinitDlls Protected
Hijacking: ActiveDesktop Protected
Score 340/340
Josh
[attachment deleted by admin]
cvsa
November 16, 2008, 9:53am
#6
Win xp sp3 - CIS (firewall only with Proactive security) and Kaspersky AV 2009 - note: (Kaspersky blocks CLT dowloading and launch (:WIN) ) -
COMODO Leaktests v.1.1.0.3
Date 10:45:20 - 11/16/2008
OS Windows XP SP3 build 2600
RootkitInstallation: MissingDriverLoad Protected
RootkitInstallation: LoadAndCallImage Protected
RootkitInstallation: DriverSupersede Protected
RootkitInstallation: ChangeDrvPath Protected
Invasion: Runner Protected
Invasion: RawDisk Protected
Invasion: PhysicalMemory Protected
Invasion: FileDrop Protected
Invasion: DebugControl Protected
Injection: SetWinEventHook Protected
Injection: SetWindowsHookEx Protected
Injection: SetThreadContext Protected
Injection: Services Protected
Injection: ProcessInject Protected
Injection: KnownDlls Protected
Injection: DupHandles Protected
Injection: CreateRemoteThread Protected
Injection: APC dll injection Protected
Injection: AdvancedProcessTermination Protected
InfoSend: ICMP Test Protected
InfoSend: DNS Test Protected
Impersonation: OLE automation Protected
Impersonation: ExplorerAsParent Protected
Impersonation: DDE Protected
Impersonation: Coat Protected
Impersonation: BITS Protected
Hijacking: WinlogonNotify Protected
Hijacking: Userinit Protected
Hijacking: UIHost Protected
Hijacking: SupersedeServiceDll Protected
Hijacking: StartupPrograms Protected
Hijacking: ChangeDebuggerPath Protected
Hijacking: AppinitDlls Protected
Hijacking: ActiveDesktop Protected
Score 340/340
(C) COMODO 2008
Melih
November 16, 2008, 7:01pm
#7
I think the issue will come when people have differnt scores for the same product, in which case I am sure the discussions between them will resolve the differences.
Its a good experiement about reallife scenerios and how products do in real life scenerios.
Melih
system
November 16, 2008, 11:31pm
#8
Agnitum Outpost Firewall Pro 2009 (latest version) with HIPS component set for maximum protection and no automatic rules created.
COMODO Leaktests v.1.1.0.1
Date 23:15:55 - 16-11-2008
OS Windows Vista SP1 build 6001
Hijacking: ActiveDesktop Vulnerable
Hijacking: AppinitDlls Protected
Hijacking: ChangeDebuggerPath Protected
Hijacking: StartupPrograms Vulnerable
Hijacking: SupersedeServiceDll Vulnerable
Hijacking: UIHost Protected
Hijacking: Userinit Protected
Hijacking: WinlogonNotify Protected
Impersonation: BITS Protected
Impersonation: Coat Protected
Impersonation: DDE Protected
Impersonation: ExplorerAsParent Protected
Impersonation: OLE automation Protected
InfoSend: DNS Test Protected
InfoSend: ICMP Test Protected
Injection: AdvancedProcessTermination Vulnerable
Injection: APC dll injection Protected
Injection: CreateRemoteThread Protected
Injection: DupHandles Vulnerable
Injection: KnownDlls Vulnerable
Injection: ProcessInject Protected
Injection: Services Protected
Injection: SetThreadContext Protected
Injection: SetWindowsHookEx Protected
Injection: SetWinEventHook Protected
Invasion: DebugControl Protected
Invasion: FileDrop Vulnerable
Invasion: PhysicalMemory Protected
Invasion: RawDisk Vulnerable
Invasion: Runner Protected
RootkitInstallation: ChangeDrvPath Vulnerable
RootkitInstallation: DriverSupersede Protected
RootkitInstallation: LoadAndCallImage Protected
RootkitInstallation: MissingDriverLoad Protected
Score 250/340
(C) COMODO 2008
Damn! I do love Comodo Firewall Pro (L)
panic
November 17, 2008, 5:22am
#9
+1
Can you please provide a list of what should be included in the guidelines?
Ewen
CIS, using all Defense+ monitor settings on:
COMODO Leaktests v.1.1.0.1
Date 下午 06:17:27 - 2008/11/17
OS Windows XP SP3 build 2600
Hijacking: ActiveDesktop Protected
Hijacking: AppinitDlls Protected
Hijacking: ChangeDebuggerPath Protected
Hijacking: StartupPrograms Protected
Hijacking: SupersedeServiceDll Protected
Hijacking: UIHost Protected
Hijacking: Userinit Protected
Hijacking: WinlogonNotify Protected
Impersonation: BITS Protected
Impersonation: Coat Protected
Impersonation: DDE Protected
Impersonation: ExplorerAsParent Protected
Impersonation: OLE automation Protected
InfoSend: DNS Test Protected
InfoSend: ICMP Test Protected
Injection: AdvancedProcessTermination Protected
Injection: APC dll injection Protected
Injection: CreateRemoteThread Protected
Injection: DupHandles Protected
Injection: KnownDlls Protected
Injection: ProcessInject Protected
Injection: Services Protected
Injection: SetThreadContext Protected
Injection: SetWindowsHookEx Protected
Injection: SetWinEventHook Protected
Invasion: DebugControl Protected
Invasion: FileDrop Protected
Invasion: PhysicalMemory Protected
Invasion: RawDisk Protected
Invasion: Runner Protected
RootkitInstallation: ChangeDrvPath Protected
RootkitInstallation: DriverSupersede Protected
RootkitInstallation: LoadAndCallImage Protected
RootkitInstallation: MissingDriverLoad Protected
Score 340/340
(:CLP)
When using “COMODO - Internet Security” preset, the “Invasion: RawDisk” test will fail. Using “COMODO - Proactive Security” preset will be just fine. (Well, I use my custom rules anyway)
don67
November 17, 2008, 1:48pm
#11
COMODO Leaktests v.1.1.0.1
Date 4:33:59 PM - 11/17/2008
OS Windows XP SP3 build 2600
Hijacking: ActiveDesktop Protected
Hijacking: AppinitDlls Protected
Hijacking: ChangeDebuggerPath Protected
Hijacking: StartupPrograms Protected
Hijacking: SupersedeServiceDll Protected
Hijacking: UIHost Protected
Hijacking: Userinit Protected
Hijacking: WinlogonNotify Protected
Impersonation: BITS Protected
Impersonation: Coat Protected
Impersonation: DDE Vulnerable
Impersonation: ExplorerAsParent Vulnerable
Impersonation: OLE automation Protected
InfoSend: DNS Test Protected
InfoSend: ICMP Test Protected
Injection: AdvancedProcessTermination Protected
Injection: APC dll injection Protected
Injection: CreateRemoteThread Protected
Injection: DupHandles Protected
Injection: KnownDlls Protected
Injection: ProcessInject Protected
Injection: Services Protected
Injection: SetThreadContext Protected
Injection: SetWindowsHookEx Protected
Injection: SetWinEventHook Protected
Invasion: DebugControl Protected
Invasion: FileDrop Protected
Invasion: PhysicalMemory Protected
Invasion: RawDisk Protected
Invasion: Runner Protected
RootkitInstallation: ChangeDrvPath Protected
RootkitInstallation: DriverSupersede Protected
RootkitInstallation: LoadAndCallImage Protected
RootkitInstallation: MissingDriverLoad Protected
Score 320/340
why i have two fails?
11. Impersonation: DDE Vulnerable
12. Impersonation: ExplorerAsParent Vulnerable
my firewall setting is default i’m using CIS latest version :THNK
Flate
November 17, 2008, 3:08pm
#12
I did the test using Trend Micro internet Security (what we have on my parents PC). The test did not go very well… (see screen shot for results)
Edit: I noticed I may have set the firewall down a bit (a higher levels it blocked without asking and did not remember anything) so I attach two new images: one with firewall on max, and one with firewall + defense against internet theft on max.
Edit: I used vista x32 on a admin account with Windows firewall deactivated and Windows Defender deactivated and UAC on.
[attachment deleted by admin]
subset
November 17, 2008, 3:25pm
#13
This is not a list, just some thoughts about application and OS settings.
Relatet to applications, all should be tested with default settings and highest security settings.
Because there is a big difference if you test
KIS 2009 with default settings (Automatic Mode) or with Interactive Mode.
NIS 2009 with default settings or with Advanced Event Monitoring enabled.
Outpost with default settings (Optimal Host Protection) or with Advanced Host Protection.
etc. etc.
Testers should be able to select the best settings for the programs they test and afterwards readers of the results would recognize, that some of their programs are very, very weak with default settings (KIS, NIS, …) and only offer a medium or high protection if they use custom settings.
Related to OS, at least all with the same settings, like for example with
XP: Admin, Windows Firewall deactivated.
Vista: Admin, Windows Firewall, Windows Defender and UAC deactivated.
With Vista 32bit it makes a real big difference, if you test with Admin account and Windows Firewall & Windows Defender deactivated (110/340) or with LUA and Windows Firewall & Windows Defender activated (250/340).
http://img412.imageshack.us/img412/6841/vistaadminvsluaxd2.th.png
Just as a note. These OS results without any 3rd party security software seem to be pretty weird and I hardly can image, that they are intended by the developers of this test program.
Cheers
Kyle142
November 17, 2008, 3:30pm
#14
I think what Melih wants is the results from the “Real World”
Perhaps not have a guide line to follow, Just list the environment and settings these tests were conducted.
Melih
November 18, 2008, 3:13am
#15
Exactly Kyle… afterall our users are not in a test environment! So how does security work for them out of box in the realworld, that is the question. If everyone is making the same mistake in the realworld and misconfiguring something which is then causing their security to be vulnerable, then these tests will show that, or it will also show providers who can’t provide high security out of box because they haven’t found a way of making it practical for usability.
Melih
AeoniAn
November 18, 2008, 4:56am
#16
CLT v1.1.0.3 = 340/340.
:Beer
edit: xp with adm rights, some restrict policies in secpol.msc. (details in sig.)
ganda
November 18, 2008, 6:55am
#17
using DriveSentry & CIS (firewall only,D+ disabled)
130/340
time to switch back i guess 88)
edit:
update!
pass 100% (340/340) using CIS w D+ (everything on D+/advanced/defense+ settings/monitor settings ticked) (:HUG)
system
November 18, 2008, 9:09pm
#18
ZoneAlarm Pro with “Program Control” set to High + “SmartDefense Advisor” set to Manual; Firewall - Internet Zone Security - High
COMODO Leaktests v.1.1.0.3
Date 20:58:48 - 18-11-2008
OS Windows Vista SP1 build 6001
RootkitInstallation: MissingDriverLoad Vulnerable
RootkitInstallation: LoadAndCallImage Protected
RootkitInstallation: DriverSupersede Protected
RootkitInstallation: ChangeDrvPath Vulnerable
Invasion: Runner Protected
Invasion: RawDisk Vulnerable
Invasion: PhysicalMemory Protected
Invasion: FileDrop Vulnerable
Invasion: DebugControl Protected
Injection: SetWinEventHook Protected
Injection: SetWindowsHookEx Protected
Injection: SetThreadContext Vulnerable
Injection: Services Vulnerable
Injection: ProcessInject Protected
Injection: KnownDlls Vulnerable
Injection: DupHandles Vulnerable
Injection: CreateRemoteThread Protected
Injection: APC dll injection Vulnerable
Injection: AdvancedProcessTermination Protected
InfoSend: ICMP Test Protected
InfoSend: DNS Test Protected
Impersonation: OLE automation Protected
Impersonation: ExplorerAsParent Protected
Impersonation: DDE Protected
Impersonation: Coat Protected
Impersonation: BITS Vulnerable
Hijacking: WinlogonNotify Protected
Hijacking: Userinit Protected
Hijacking: UIHost Protected
Hijacking: SupersedeServiceDll Vulnerable
Hijacking: StartupPrograms Vulnerable
Hijacking: ChangeDebuggerPath Protected
Hijacking: AppinitDlls Protected
Hijacking: ActiveDesktop Protected
Score 220/340
(C) COMODO 2008
ZoneAlarm Pro with “Program Control” set to High + “SmartDefense Advisor” set to Auto; Firewall - Internet Zone Security - High
COMODO Leaktests v.1.1.0.3
Date 21:00:05 - 18-11-2008
OS Windows Vista SP1 build 6001
RootkitInstallation: MissingDriverLoad Vulnerable
RootkitInstallation: LoadAndCallImage Protected
RootkitInstallation: DriverSupersede Protected
RootkitInstallation: ChangeDrvPath Vulnerable
Invasion: Runner Protected
Invasion: RawDisk Vulnerable
Invasion: PhysicalMemory Protected
Invasion: FileDrop Vulnerable
Invasion: DebugControl Protected
Injection: SetWinEventHook Protected
Injection: SetWindowsHookEx Protected
Injection: SetThreadContext Vulnerable
Injection: Services Vulnerable
Injection: ProcessInject Protected
Injection: KnownDlls Vulnerable
Injection: DupHandles Vulnerable
Injection: CreateRemoteThread Protected
Injection: APC dll injection Vulnerable
Injection: AdvancedProcessTermination Protected
InfoSend: ICMP Test Protected
InfoSend: DNS Test Protected
Impersonation: OLE automation Protected
Impersonation: ExplorerAsParent Protected
Impersonation: DDE Protected
Impersonation: Coat Protected
Impersonation: BITS Vulnerable
Hijacking: WinlogonNotify Protected
Hijacking: Userinit Protected
Hijacking: UIHost Protected
Hijacking: SupersedeServiceDll Vulnerable
Hijacking: StartupPrograms Vulnerable
Hijacking: ChangeDebuggerPath Protected
Hijacking: AppinitDlls Protected
Hijacking: ActiveDesktop Protected
Score 220/340
(C) COMODO 2008
No difference of what so ever.
WinXP Home SP3 Running CIS 3.3.55810.432 (FW ONLY) with FW Sec Level Custom Mode and Defence + Level Safe Mode and Configuration Optimum Security
Alongside AVG 8 Free and Comodo BOClean
COMODO Leaktests v.1.1.0.1
Date 04:06:35 - 19/11/2008
OS Windows XP SP3 build 2600
Hijacking: ActiveDesktop Protected
Hijacking: AppinitDlls Protected
3. Hijacking: ChangeDebuggerPath Vulnerable
4. Hijacking: StartupPrograms Vulnerable
Hijacking: SupersedeServiceDll Protected
Hijacking: UIHost Protected
Hijacking: Userinit Protected
Hijacking: WinlogonNotify Protected
Impersonation: Coat Protected
Impersonation: DDE Protected
Impersonation: ExplorerAsParent Protected
Impersonation: OLE automation Protected
InfoSend: ICMP Test Protected
Injection: AdvancedProcessTermination Protected
Injection: APC dll injection Protected
Injection: CreateRemoteThread Protected
Injection: DupHandles Protected
Injection: KnownDlls Protected
Injection: ProcessInject Protected
Injection: Services Protected
Injection: SetThreadContext Protected
Injection: SetWindowsHookEx Protected
Injection: SetWinEventHook Protected
Invasion: DebugControl Protected
Invasion: FileDrop Protected
Invasion: PhysicalMemory Protected
Invasion: RawDisk Protected
Invasion: Runner Protected
RootkitInstallation: ChangeDrvPath Protected
RootkitInstallation: DriverSupersede Protected
RootkitInstallation: LoadAndCallImage Protected
RootkitInstallation: MissingDriverLoad Protected
[size=10pt]Score 300/320 [/size]
1. I’m wondering why I’m failing on tests 3 and 4 no matter what config I have.
2. Why do I seem to have the Comodo Leatests v.1.1.0.1 when others seem to have v 1.1.0.3???
system
November 19, 2008, 9:04am
#20
I attached the latest version for you, Mark. And you need to have CIS in Proactive Security Configuration.
Josh
[attachment deleted by admin]