Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon. Entire thread

What are the best solutions for sandboxing and debugging?

Name: Anonymous 2015-06-26 6:21

Malware analysis involves sandboxing, debugging, and analysis tools. I'm hoping you guys can help me figure out the finer details in setting up my malware analysis rig.

I think I want to do nested VMs (like Qemu running within Virtualbox running within VMware, or something like that) for added security against VM breakout 0 days, but I want to know what you think. I have 32GB of RAM so I can afford to be inefficient.

I won't give the VMs network access just in case they have some self-propagating Cryptolocker-esque shit that tries to infect my network drives. Or maybe I should just set up a separate VLAN and make ACL rules so that my test rig can't interact with any other private addresses, meaning it can't touch my other local stuff. Then I could still monitor shit in Wireshark even if I can't into proper debugging forensics.

As far as debuggers go, I've heard that Ollydbg is good, but I have no experience with such things so I'm not sure if that's true or not.
Also how can I make a VM not appear to be a VM? And how can I get around some malware's anti-debugging features?

Also, aside from Wireshark and Process Explorer, what are some other good tools for analyzing what's happening within an OS? Windows or GNU/Linux, doesn't matter, since I'll be doing tests for malware and exploits for all kinds of systems.

Thanks in advance, cuties.

Name: Anonymous 2015-07-01 14:42

>>38
Well, you can make your own cable; or if you're really paranoid, wire up a repeater box yourself.

Name: Anonymous 2015-07-01 15:17

>>39
It's easy - write your own virtual machine, one that nobody knows about so that nobody could possibly find loopholes though it. Now that I think about it, you could even use a computer that isn't x86 as this way, it'd be impossible for malware that is compiled for x86 to run.

Name: Anonymous 2015-07-01 15:45

>>42
it'd be impossible for malware that is compiled for x86 to run.
but the whole point is to run it
static analysis is harder than just running it and seeing what it does

Name: Anonymous 2015-07-01 16:19

>>43
I believe what >>42-dono meant is to write an x86 emulating VM.

Name: Anonymous 2015-07-01 20:46

A good viral analysis system would track changes to the snapshot, after the virus has finished execution. Similarly how you search memory for variables, during cracking.

Name: Anonymous 2015-07-03 17:03

>>43
Whom are you quoting?

Name: Anonymous 2015-07-04 11:17

>>46
lol, the mad nigger is back

Newer Posts
Don't change these.
Name: Email:
Entire Thread Thread List