HackMag

  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • Devops
  • HackMag

  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • Devops
  • Sign Up
  • Log In
  • Subscriptions
  • Log Out

Malware under surveillance. Sandboxes and how to detect them

Written by Boris Razor & Alex Mess

Boris Razor & Alex Mess

One of the ways to detect malware is to run it in a sandbox, i.e. in an isolated environment where you can monitor the program’s behavior. In this article, we will explain how sandboxes work and examine techniques allowing malicious programs to evade detection (including methods not covered in specialized literature and Internet blogs).
Read full article →

Protected by Qrator Labs
Recent Posts
  • Fastest shot. Optimizing Blind SQL injection
  • Elephants and their vulnerabilities. Most epic CVEs in PostgreSQL
  • Timeline of everything. Collecting system events with Plaso
  • First contact: How hackers steal money from bank cards
  • EVE-NG: Building a cyberpolygon for hacking experiments
Recent Comments
  • n01 on Spying penguin. Windows post-exploitation with a Linux-based VM
  • professional retard on Software for cracking software. Selecting tools for reverse engineering
  • Jim on Using Android to keep tabs on your girlfriend. With her consent, of course!
  • john on Homemade keylogger. Writing an undetectable keylogger in C#
  • Hosay on What data Windows 10 sends to Microsoft and how to stop it
  • Facebook

  • Twitter

  • Rss

HackMag.com © 2022

HackMag.com publishes high-quality translated content about information security, cyber security, hacking, malware and devops.