官术网_书友最值得收藏!

How it works...

At a conceptual level, obtaining dynamic analysis results consists of running samples in environments that allow the analyst to collect runtime information. Cuckoo Sandbox is a flexible framework with prebuilt modules to do just that. We began our recipe for using Cuckoo Sandbox by opening up the web portal (Step 1). A command-line interface (CLI) exists as well. We proceeded to submit a sample and select the type of analysis we wished to perform (Steps 2 and 3). These steps, too, can be performed through the Cuckoo CLI. We proceeded to examine the analysis report (Step 4). You can see at this stage how the many modules of Cuckoo Sandbox reflect in the final analysis output. For instance, if a module for capturing traffic is installed and used, then the report will contain the data captured in the network tab. We proceeded to focus our view of the analysis to behavioral analysis (Step 5), and in particular to observe the sequence of API calls. API calls are basically operations performed by the OS. This sequence makes up a fantastic feature set that we will utilize to detect malware in future recipes. Finally, note that in a production environment, it may make sense to create a custom-made sandbox with custom modules for data collection, as well as equip it with anti-VM detection software to facilitate successful analysis.

主站蜘蛛池模板: 芷江| 海林市| 远安县| 宁国市| 共和县| 南皮县| 黔西县| 吴旗县| 高台县| 黄骅市| 运城市| 宝应县| 潢川县| 惠州市| 比如县| 攀枝花市| 攀枝花市| 犍为县| 米易县| 山阳县| 雷州市| 武穴市| 溧水县| 丰镇市| 萨迦县| 彭州市| 金华市| 青海省| 巴马| 大田县| 苗栗市| 璧山县| 翼城县| 长沙市| 银川市| 苍南县| 曲靖市| 永和县| 崇州市| 达日县| 临江市|