-
Notifications
You must be signed in to change notification settings - Fork 13
m-dwyer/packer-malware
Folders and files
Name | Name | Last commit message | Last commit date | |
---|---|---|---|---|
Repository files navigation
Intro: Packer templates for creating a basic malware analysis lab, as per the recommended setup in Practical Malware Analysis, but using VirtualBox instead of VMware. This will create a Debian VM serving up DHCP with INetSim, in addition to a Windows host for testing, reverse engineering and otherwise analysing malware. This will allow you to (relatively) quickly and easily spin up a lab for performing malware analysis which you can then quickly destroy once complete. VMs are isolated from the outside world on an internal network. You can ignore any SSH connection timeouts for this reason. Windows VMs are fairly vanilla and do not include any anti-anti-VM changes to stop malware from detecting an underlying VM. I hope to include some methods soon. Modify any URLs for ISO downloads accordingly. Any recommendations, feedback, pull requests welcome. Templates: debian-8.2.0-amd64.json - Base Debian install with static IP 10.0.0.1 serving DHCP on 10.0.0.0/24. Includes INetSim. windows-10-victim.json - Base Windows 10 Enterprise RTM install with a dynamic IP pulled from the Debian box. Now includes some basic apps installed via Chocolatey (see scripts/windows/installtools.ps1). I may make some Chocolatey packages for other tools (disassemblers, etc), or possibly just add an upload directory for you to deploy your own favourite tools. Usage: packer build debian-8.2.0-amd64.json packer build windows-10-victim.json vagrant box add boxes/debian820.box --name=debian820 vagrant box add boxes/win10victim.box --name=win10victim vagrant up d vagrant up v
About
No description, website, or topics provided.
Resources
Stars
Watchers
Forks
Releases
No releases published
Packages 0
No packages published