|
OSI bean dip posted:Sandboxing is useful to me because I can run the malware within a controlled environment to determine what the ramifications are, but there are solutions that will run malware at the perimeter and will react after the fact if it does something that is discovered to be malicious. You just have to hope that the box doesn't get compromised because of a a vulnerability. can you comment on malicious code that stays benign when it notices it's in a sandbox? detecting sandboxing seems like it's really easy, or at least noticing you're in a virtualbox vm
|
# ¿ Oct 29, 2015 21:14 |
|
|
# ¿ May 21, 2024 01:38 |
|
OSI bean dip posted:This is a good read if you're curious: hahaha jesus christ: code:
|
# ¿ Oct 29, 2015 22:34 |
|
Khablam posted:You seem to be desperately reaching for some sort of "gotcha" where you can point that you know something more than me (and anyone else reading) and not in any way suggesting anything useful. all your posts along this topic reek of ... insecurity, shall we say. please go take a walk. nobody cares, nobody respects you at this point. OSI is posting not to attack you, but rather to make sure someone reading this thread doesn't take someone like you or your misinformation seriously
|
# ¿ Oct 30, 2015 00:23 |
|
Subjunctive posted:Well... i've read it as OSI & co attacking the lovely mindset of computer janitors who think that you can solve computer security issues with extremely high doses of homeopathic software. OSI's last post was totally reasonable and khablam's childish attempt at a repartee is both pathetic and uninteresting to anyone but themselves. but now i too am making GBS threads up the place so
|
# ¿ Oct 30, 2015 00:49 |