chocolatey-community / chocolatey-package-requests

Please submit your package requests as issues here
Apache License 2.0
96 stars 18 forks source link

RFP - Malwarebytes Anti Exploit #146

Closed zero77 closed 4 years ago

zero77 commented 7 years ago

Shields vulnerable systems and software like most web browsers, Jave, flash, Silverlight and much more from exploit attacks.

https://forums.malwarebytes.com/topic/184939-mbae-109-latest-standalone-beta

Thanks

chtof commented 5 years ago

Link no longer available. @zero77: Do you have another link?

AdmiringWorm commented 5 years ago

@chtof https://www.malwarebytes.com/antiexploit/

zero77 commented 5 years ago

@chtof or https://forums.malwarebytes.com/forum/126-anti-exploit-beta/

chtof commented 5 years ago

Status: Review https://chocolatey.org/packages/malwarebytes-antiexploit

chtof commented 5 years ago

As they are not static link for the installer file and the dynamic link is either temporary or depends on something like the IP address, the package fails. So, a statis link is welcome or a tip to handle a such situation.

chtof commented 5 years ago

Status: Package rejected Package rejected as there is no static link to download the installer and on another hand, the license doesn't allow to embed the installer. So there is no way to integrate this package in the official Chocolatey repository.

Can be closed.

AdmiringWorm commented 5 years ago

@chtof Am I correct to assume that only the url changes? But the checksum stays the same?

If so, there is a way. But you will need to change the package to grab the url during installation in that case

chtof commented 5 years ago

@AdmiringWorm As I said, just as reminder, I have tried to use background "Internet Explorer calls" in PowerShell but when I click on the "download button", I haven't find a way to get the url of the download file. Yes, the checksum stays the same and only the url changes. So I am interested to know how to handle this situation.

AdmiringWorm commented 5 years ago

hmm, I see. I have more or less figured out how they are generating the url (but not what would be needed to get it).

Seems like they have taken some incredible steps to prevent automatic downloads (or at least it looks that way to me).

I will mark this as blocked upstream, but won't be closing it as there is a way. It just isn't possible without parsing the necessary javascript files, and figuring out what is necessary to call the same api as their download site uses.

mkevenaar commented 5 years ago

@chtof have you looked at https://chocolatey.org/packages/adwcleaner and https://chocolatey.org/packages/malwarebytes these seem to have a static url. Perhaps https://chocolatey.org/packages/fiddler can help you record the requests.

AdmiringWorm commented 5 years ago

@mkevenaar those packages uses an already listed static url, one that is showned on the website (I assume that software will probably eventually also use a static url when it is out of beta).

chtof commented 5 years ago

@AdmiringWorm According https://www.malwarebytes.com/antiexploit/ , I understand antiexploit has been integrated in the premium version of MalwareBytes so we can think it will be not officially released as a standalone tool.

pauby commented 4 years ago

Is there any movement with this?

chtof commented 4 years ago

Excepted if we have an answer from @zero77 or @AdmiringWorm regarding my previous post, my opinion is to close this issue. Note the link provided by @zero77 is no longer available.