-
vagrant: punch hole through NAT for IDA in firewall
-
vagrant no net, NAT
-
doc: vagrant update box + send on network (archiving)
-
doc: vagrant team workflow
-
vagrant box repackaging covered here: http://huestones.co.uk/node/305
-
-
git malware analysis template integrated with malboxes
-
Integrate virtualbox and wireshark tips: https://www.virtualbox.org/wiki/Network_tips
-
Watch this: http://static.sstic.org/videos2016/SSTIC_2016-06-02_P07.mp4
-
Use whonix gateway? https://www.whonix.org/wiki/Main_Page
-
Perform automatic updates on initial setup
-
Automatic updates configuration (disabled/enabled)
Also filed in issue #23.
-
Nice overview article: https://byte-atlas.blogspot.ca/2017/02/hardening-vbox-win7x64.html
-
https://github.com/CheckPointSW/InviZzzible, new tool by checkpoint people
-
https://github.com/a0rtega/pafish, vm detection tool (pass it)
-
http://www.securityweek.com/dyre-banking-trojan-counts-processor-cores-detect-sandboxes
-
http://vmcloak.readthedocs.io/en/latest/hwconfig.html#hwconfig-create
-
config.vm.box_url
# Create a private network, which allows host-only access to the machine # using a specific IP. # config.vm.network "private_network", ip: "192.168.33.10"
# Create a public network, which generally matched to bridged network. # Bridged networks make the machine appear as another physical device on # your network. # config.vm.network "public_network"
To do malware analysis on embedded systems.
-
QEMU on Windows, https://qemu.weilnetz.de/