sandbox

EvilExtractor Network Forensics
Erik Hjelmvik | | 1-Password-Cookies, 193.42.33.232, 2-Credentials, 3-Files, 89.116.53.55, ANY.RUN, EvilExtractor, FTP, KK2023.zip, NetworkMiner, sandbox, tria.ge, Triage
I analyzed a PCAP file from a sandbox execution of the Evil Extractor stealer malware earlier today. This stealer collects credentials and files of interest from the victim's computer and exfiltrates them ...

PolarProxy in Windows Sandbox
Erik Hjelmvik | | HTTPS, NetworkMiner, PCAP-over-IP, pcapoverip, PolarProxy, Proxifier, proxy, sandbox, SOCKS, TLS, Windows, Windows Sandbox, WSB
In this video I demonstrate how PolarProxy can be run in a Windows Sandbox to intercept and decrypt outgoing TLS communication. This setup can be used to inspect otherwise encrypted traffic from ...

Running NetworkMiner in Windows Sandbox
Erik Hjelmvik | | hypervisor, Malware, Netresec, NetworkMiner, pcap, sandbox, VirtualBox, Windows, Windows Sandbox
NetworkMiner can be run in a highly efficient Windows Sandbox in order to analyze malicious PCAP files in Windows without accidentally infecting your Windows PC. This blog post shows how to set ...

Installing a Fake Internet with INetSim and PolarProxy
Erik Hjelmvik | | behavioral analysis, dns, dynamic malware analysis, http, HTTPS, INetSim, Malware, pcap, PolarProxy, proxy, sandbox, smtp, SMTPS, TLS, TLS termination, Tutorial
This is a tutorial on how to set up an environment for dynamic malware analysis, which can be used to analyze otherwise encrypted HTTPS and SMTPS traffic without allowing the malware to ...
Not All Sandboxes Are Created Equal
Sandbox environments are a common feature of many cybersecurity solutions in their fight against advanced malware. Firewalls, endpoint protection, and even next-generation machine learning systems use sandboxes as one of their lines ...

6 Best Practices to Make the Most of Your Sandbox Proof of Concept
Any time you incorporate a major new component—such as a sandbox platform—into your security ecosystem, it’s important to do a rigorous, side-by-side evaluation of competing products to determine the best choice for ...
Security Boulevard

Man-in-the-Disk Attack Lets Hackers Bypass Android App Sandbox Security
Lucian Constantin | | android malware, dynamic loading, fax protocol, Faxploit, multifunction printer, sandbox
Researchers have devised a new attack technique that takes advantage of how apps use the external storage of Android devices to store files to bypass security restrictions. Under the Android security model each ...
Security Boulevard
VirusTotal’s Android Sandbox
VirusTotal has announced a significant update to its Android sandboxing system ...