Penetration Testing mailing list archives

Re: Rootkits


From: "Bojan Zdrnja" <bojan.zdrnja () gmail com>
Date: Fri, 10 Mar 2006 15:41:54 +1300

On 3/10/06, Idan Deshe <deshe.idan () gmail com> wrote:
An easier way will be to use a virtual machine like VM-ware.


Not necessarily. Keep in mind that a lot of malware today detects
VMWare and, in case it's running in a virtual machine, exits or does
something benign.
This is usually done in order to make reverse engineering more
difficult (and has a nice benefit that named malware doesn't work in
cases you use VMWare :).

Bojan

------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security?
As attacks through web applications continue to rise, you need to proactively
protect your applications from hackers. Cenzic has the most comprehensive
solutions to meet your application security penetration testing and
vulnerability management needs. You have an option to go with a managed
service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm).
Download FREE whitepaper on how a managed service can help you:
http://www.cenzic.com/news_events/wpappsec.php
And, now for a limited time we can do a FREE audit for you to confirm your
results from other product. Contact us at request () cenzic com
------------------------------------------------------------------------------


Current thread: