Skip to content

Piero Bosio Social Web Site Personale Logo Fediverso

Social Forum federato con il resto del mondo. Non contano le istanze, contano le persone

Non riesco a battere un boss in Silksong.

Uncategorized
24 5 39

Gli ultimi otto messaggi ricevuti dalla Federazione
  • @evan Oooh, you caught a new Teeny Void Demon in the cat trap! What a perfectly seasonal addition to the family, congrats.

    And welcome, Corvus! My black-but-for-that-silly-pointing-mutation Sudo sez "YOOOOWWWWWLLLOOOOooooo".

    read more

  • Making a Virtual Machine Look like Real Hardware to Malware

    Running suspicious software in a virtual machine seems like a basic precaution to figure out whether said software contains naughty code. Unfortunately it’s generally rather easy to detect whether or not one’s software runs inside a VM, with [bRootForce] going through a list of ways that a VirtualBox VM can be detected from inside the guest OS. While there are a range of obvious naming issues, such as the occurrence of the word ‘VirtualBox’ everywhere, there many more subtle ways too.

    Demonstrated is the PoC ‘malware’ application called Al-Khaser, which can be used to verify one’s anti-malware systems, such as when trying to unleash a debugger on a piece of malware, run it inside a VM, along with many more uses. Among its anti-virtualization features are specific registry key names and values, file system artefacts, directory names, MAC addresses, virtual devices, etc.

    In order to squeeze by those checks, [bRootForce] created the vbox_stealth shell script for Bash-blessed systems in order to use the VirtualBox Manager for the renaming of hardware identifier, along with the VBoxCloak project’s PowerShell script that’s used inside a Windows VirtualBox guest instance to rename registry keys, kill VirtualBox-specific processes, and delete VirtualBox-specific files.

    Theoretically this should make it much harder for any malware to detect that it’s not running inside Windows on real hardware, but as always there are more subtle ways that are even harder to disguise.

    youtube.com/embed/-On6bWFXuM8?…

    hackaday.com/2025/10/27/making…

    read more

  • On that note, we have a new member of our family. His name is Corvus. He is smol but mighty. We like him alot. /cc @maj @amita @Stavro

    read more

  • read more

  • @evan Can I write it in PHP as long as I call the python library somehow?

    read more

  • Tutti gli psicodrammi in Apple sull’Ai

    L'articolo proviene da e viene ricondiviso sulla comunità Lemmy @informatica
    Presa in contropiede da Trump, che l'ha costretta a indirizzare 500 miliardi in piani di sviluppo negli Usa, Apple continua a essere in difficoltà sul fronte Ai. Siri, dopo tanti rinvii, non può certo più mancare il debutto del prossimo

    read more

  • Are you on the Fediverse because you love social networking, or because you hate social networking?

    read more

  • It's for Computer Networking. I have to write a processor that takes a bespoke CSV format for firewall rules and turns them into calls to OpenFlow using a Python library called pox.

    read more
Post suggeriti
  • 0 Votes
    1 Posts
    0 Views
    Making a Virtual Machine Look like Real Hardware to MalwareRunning suspicious software in a virtual machine seems like a basic precaution to figure out whether said software contains naughty code. Unfortunately it’s generally rather easy to detect whether or not one’s software runs inside a VM, with [bRootForce] going through a list of ways that a VirtualBox VM can be detected from inside the guest OS. While there are a range of obvious naming issues, such as the occurrence of the word ‘VirtualBox’ everywhere, there many more subtle ways too.Demonstrated is the PoC ‘malware’ application called Al-Khaser, which can be used to verify one’s anti-malware systems, such as when trying to unleash a debugger on a piece of malware, run it inside a VM, along with many more uses. Among its anti-virtualization features are specific registry key names and values, file system artefacts, directory names, MAC addresses, virtual devices, etc.In order to squeeze by those checks, [bRootForce] created the vbox_stealth shell script for Bash-blessed systems in order to use the VirtualBox Manager for the renaming of hardware identifier, along with the VBoxCloak project’s PowerShell script that’s used inside a Windows VirtualBox guest instance to rename registry keys, kill VirtualBox-specific processes, and delete VirtualBox-specific files.Theoretically this should make it much harder for any malware to detect that it’s not running inside Windows on real hardware, but as always there are more subtle ways that are even harder to disguise.youtube.com/embed/-On6bWFXuM8?…hackaday.com/2025/10/27/making…
  • 0 Votes
    4 Posts
    0 Views
    @stevendbrewer LOL
  • 0 Votes
    1 Posts
    0 Views
    Trump s’intesta la fine di un’altra guerra: la console warL'articolo proviene da #StartMag e viene ricondiviso sulla comunità Lemmy @informaticaPer molti osservatori Microsoft sarebbe pronta a ritirarsi dal mercato dei videogiochi come produttrice di piattaforme Xbox e la decisione di rendere la sua esclusiva di punta, Halo, disponibile anche sulla rivale di
  • OF COURSE THE CVE WEBSITE DOESN'T WORK ON FIREFOX

    Uncategorized
    2
    0 Votes
    2 Posts
    0 Views
    @hipsterelectron I wonder how many CVEs have been filed against the CVE website