It's that exciting time of the year folks when new people from the security walks of life throng to casinos in the desert. Yes! I am talking about Black Hat, BSidesLV, DefCon. Bringing to you a part of utility that will be completely released at BSidesLV - SmoothCriminal, which demonstrates an anti-VM & anti-sandbox technique that is used by some malwares today. Read more about SmoothCriminal: Sandbox Detection Via Cursor Speeds!
Reverse Engineering Archives:
There are a lot of Portable Executable (PE) file explorers in the market - both professional and free. Most of them have similar features but only some of them play well on Microsoft Windows as well as *NIX platform. One such tool that is quickly becoming my favourite is PPEE short for Professional PE File Explorer. It is VERY portable and handles well even on Kali! Read more about PPEE: A Professional PE File Explorer!
Malware's are always getting smarter and trying to outsmart our generic detection methodologies. One of the first ways they avoid detection is by checking if the executing environment is a virtual machine (VM). There are multiple ways to do that. Red Pill by Joanna Rutkowska, verifying memory structures such as Store Interrupt Descriptor Table (SIDT), Store Local Descriptor Table (SLDT), Store Global Descriptor Table (SGDT) and Store Task Register (STR) and checking for well known registry Read more about Antivmdetection: Thwart Virtual Machine Detection!
Docker containers are the future! It surely seems so from the myriad projects that are being 'dockerized'! One such cool project is Docker IDA, your answer for large scale reverse engineering, which allows you to run IDA Pro disassembler in Docker containers for automating, scaling and distributing the use of IDAPython scripts. Read more about Docker IDA: The Large Scale Reverse Engineering System!