-
Notifications
You must be signed in to change notification settings - Fork 480
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Windows: update vadyarascan to use generic yarascan requirements #1050
Windows: update vadyarascan to use generic yarascan requirements #1050
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This should be fine, but we just need to keep an eye on the requirements matching the functionality. For instance, there was previously no insensitive flag, and now there is. Since it inherits heavily, this should be fine but just something to keep an eye on...
Good spot @ikelos - I'm hopeful that shouldn't be an issue. It probably means that the version number for the plugin needs to go to 1.1.0? As it's an actually additive change - Feels a little silly for me to make a PR for that but very happy to if you think it's the right thing to do. I'm just thinking if this breaks something subtle in the future knowing the difference between |
It's a bit of a tricky one, the API number is for plugin to use to verify other plugins. I don't think we've included the external/requirements in that, because they can be probed by the plugin at runtime (although most people will make assumptions). You did change the version to 1.0.1, so we could determine the change if necessary and critically, the config options the plugins accept shouldn't be used by other code, they should only be used by the UI. Other plugins should be directly calling the API methods, which haven't changed (and already accepted that setting). Ugh, that does raise a sticky situation though, and one which we should resolve... The |
Oh dear, looks like I missed it way the way back in 2020. 5:S It's kind of ok, since the rules returned are what the plugin actually uses, but it's keeping the requirements and the processing in sync that's the issue (ie, making sure the options used match the rules object generated). Perhaps we could just beef up option checking a little? The other option would be to parameterize the process_yara_options to take each individual option? We could then pass in **conf, and that should have the same effect? That would be a major version bump to yarascan, but it might be the best way to resolve the issue? What do you think? |
It also doesn't look like the insensitive flag is actually used at all?!? 5:S |
😬 - ahhh sorry about the headache. I'm not sure I'm qualified to give you a useful opinion, but it sounds to me like fixing it Is it worth making a separate issue? |
Yeah, probably best so we don't lose track of it, if you don't mind? Thanks! |
Hello 👋
This PR updates the windows vadyarascan plugin to change how it's requirements are created as per #1047.
Here is an example of running the vadyarascan plugin directly using rules the crypto_signatures.yar rules
The windows svcscan plugin uses vadyarascan, and this also works as before with no changes needed to svcscan. I'm hopeful that means any other plugins out there that use vadyarascan therefore won't be affected either.