![]() You could use the Tor Browser again however you want to be even more secure with no chance of anyone tracing you. So you came across a few really suspicious links during your anonymous research, you want to click them in a safe environment so you would use your analysis VM. Note: If you are already a malware researcher, chances are you are already running some kind of virtual environment for analysis, etc.An operating system to run on said virtualization application.Another Virtualization Application (Vmware / VirtualBox / etc.).Need to gather more programs/resources to start.Execute malware in a safe environment (non-traffic capture).Protect the host system by running in a virtual environment.Purpose: To hide who you are while performing research through your browser AND protecting your host system from drive-by download attacks.
0 Comments
Leave a Reply. |