Re: Rootkits

From: Bojan Zdrnja (bojan.zdrnja@gmail.com)
Date: Thu Mar 09 2006 - 21:41:54 EST


On 3/10/06, Idan Deshe <deshe.idan@gmail.com> wrote:
> An easier way will be to use a virtual machine like VM-ware.
>

Not necessarily. Keep in mind that a lot of malware today detects
VMWare and, in case it's running in a virtual machine, exits or does
something benign.
This is usually done in order to make reverse engineering more
difficult (and has a nice benefit that named malware doesn't work in
cases you use VMWare :).

Bojan

------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security?
As attacks through web applications continue to rise, you need to proactively
protect your applications from hackers. Cenzic has the most comprehensive
solutions to meet your application security penetration testing and
vulnerability management needs. You have an option to go with a managed
service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm).
Download FREE whitepaper on how a managed service can help you:
http://www.cenzic.com/news_events/wpappsec.php
And, now for a limited time we can do a FREE audit for you to confirm your
results from other product. Contact us at request@cenzic.com
------------------------------------------------------------------------------



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:55:39 EDT