📜 ⬆️ ⬇️

EMET v4 Release

Last week, the beta version of the EMET v4 toolkit was released. We already wrote about some new features of the 4th version and would like to dwell in more detail on the release itself, since this tool really deserves attention. Again, the Enhanced Mitigation Experience Toolkit (EMET) uses preventive methods to block various actions of exploits to protect applications from attacks that are aimed at exploiting flaws (or vulnerabilities) in software and changing the flow of code. Despite the fact that modern Windows 7 and Windows 8 have built-in, enabled by default, DEP and ASLR capabilities aimed at mitigating (mitigation) the consequences of exploitation, EMET allows you to introduce new features for blocking actions of exploits, as well as enable DEP or ASLR default, for example, for outdated Windows XP.

In our post, we want to provide an overview of the main features of the fourth version of EMET, which help protect against exploits.

Before considering the main features of this tool, let's clarify a few points:

EMET main window.
')


From the point of view of protection against exploits, the tool has two types of settings: for the system as a whole, that is, the general rule for all applications in the system (System Status) and for specific applications (Configure Applications). Settings for the system include four main points:

Decoding settings DEP, ASLR, SEHOP, see here .
The tool supports built-in protection profiles for quick setup:

You can check the status of processes with DEP, ASLR enabled, for example, using Process Explorer, by setting the display of the corresponding columns in the settings. View-> Select Columns-> DEP Status, ASLR Enabled.



EMET allows you to protect the application, including from the following very well-known methods used by exploits:

EMET groups these methods, relating some of them to a specific group. Below is a screenshot of the settings for the processes, in which you can see how the mitigation methods are grouped and the methods used by the exploits.



This screenshot shows settings related directly to the memory.









To perform all these operations, EMET uses the well-known inline code patching method, which is graphically presented in the screenshot below (process controlled by EMET).



EMET has additional advanced features for applications that are available from the Application Configuration.




Specify the action that EMET will perform when one of the operating conditions occurs. The options are: Stop on exploit (blocking the action with the display of a special message and the completion of the process) and Audit only (notification of the action).



What should EMET protect?



Please note that EMET has a list of processes for which it will be enabled by default. These processes include: MS Internet Explorer web browser, Adobe Acrobat, Java, MS Office. You can see the list of processes in the Apps window.
We highlight the following features regarding application security using EMET:



List of incompatibilities of EMET mechanisms with various applications.

Microsoft EMET Guide [PDF] here .
EMET presentation on RECon'13 from one of the developers here .

Source: https://habr.com/ru/post/184428/


All Articles