Skip to content

Piero Bosio Social Web Site Personale Logo Fediverso

Social Forum federato con il resto del mondo. Non contano le istanze, contano le persone

Tenco 2025, thread

Uncategorized
6 1 1

Gli ultimi otto messaggi ricevuti dalla Federazione
  • @Revenant with this poll or in general?

    read more

  • They should just keep it and use it. The money comes with no strings attached. An honest politician should be able to accept a donation from the Association of Bullfrog Haters and still vote for bullfrog conservation. If the ABH made the wrong calculations in their lobbying plans, too bad for them.

    read more

  • It's weird when politicians return a campaign donation from a particular donor. It's like giving someone a refund when the product they bought is defective.

    read more

  • @evan I have no idea what is going on.

    read more

  • OK, it turned out to be pretty fun. A lot of the work was looking up various arguments for pox classes and methods, but in the end it's a pretty tight firewall implementation that is passing the test suite. Yippee!

    read more

  • @evan Oooh, you caught a new Teeny Void Demon in the cat trap! What a perfectly seasonal addition to the family, congrats.

    And welcome, Corvus! My black-but-for-that-silly-pointing-mutation Sudo sez "YOOOOWWWWWLLLOOOOooooo".

    read more

  • Making a Virtual Machine Look like Real Hardware to Malware

    Running suspicious software in a virtual machine seems like a basic precaution to figure out whether said software contains naughty code. Unfortunately it’s generally rather easy to detect whether or not one’s software runs inside a VM, with [bRootForce] going through a list of ways that a VirtualBox VM can be detected from inside the guest OS. While there are a range of obvious naming issues, such as the occurrence of the word ‘VirtualBox’ everywhere, there many more subtle ways too.

    Demonstrated is the PoC ‘malware’ application called Al-Khaser, which can be used to verify one’s anti-malware systems, such as when trying to unleash a debugger on a piece of malware, run it inside a VM, along with many more uses. Among its anti-virtualization features are specific registry key names and values, file system artefacts, directory names, MAC addresses, virtual devices, etc.

    In order to squeeze by those checks, [bRootForce] created the vbox_stealth shell script for Bash-blessed systems in order to use the VirtualBox Manager for the renaming of hardware identifier, along with the VBoxCloak project’s PowerShell script that’s used inside a Windows VirtualBox guest instance to rename registry keys, kill VirtualBox-specific processes, and delete VirtualBox-specific files.

    Theoretically this should make it much harder for any malware to detect that it’s not running inside Windows on real hardware, but as always there are more subtle ways that are even harder to disguise.

    youtube.com/embed/-On6bWFXuM8?…

    hackaday.com/2025/10/27/making…

    read more

  • On that note, we have a new member of our family. His name is Corvus. He is smol but mighty. We like him alot. /cc @maj @amita @Stavro

    read more
Post suggeriti
  • 0 Votes
    1 Posts
    0 Views
    Making a Virtual Machine Look like Real Hardware to MalwareRunning suspicious software in a virtual machine seems like a basic precaution to figure out whether said software contains naughty code. Unfortunately it’s generally rather easy to detect whether or not one’s software runs inside a VM, with [bRootForce] going through a list of ways that a VirtualBox VM can be detected from inside the guest OS. While there are a range of obvious naming issues, such as the occurrence of the word ‘VirtualBox’ everywhere, there many more subtle ways too.Demonstrated is the PoC ‘malware’ application called Al-Khaser, which can be used to verify one’s anti-malware systems, such as when trying to unleash a debugger on a piece of malware, run it inside a VM, along with many more uses. Among its anti-virtualization features are specific registry key names and values, file system artefacts, directory names, MAC addresses, virtual devices, etc.In order to squeeze by those checks, [bRootForce] created the vbox_stealth shell script for Bash-blessed systems in order to use the VirtualBox Manager for the renaming of hardware identifier, along with the VBoxCloak project’s PowerShell script that’s used inside a Windows VirtualBox guest instance to rename registry keys, kill VirtualBox-specific processes, and delete VirtualBox-specific files.Theoretically this should make it much harder for any malware to detect that it’s not running inside Windows on real hardware, but as always there are more subtle ways that are even harder to disguise.youtube.com/embed/-On6bWFXuM8?…hackaday.com/2025/10/27/making…
  • 0 Votes
    3 Posts
    0 Views
    @Revenant with this poll or in general?
  • 0 Votes
    1 Posts
    0 Views
    Europol has asked governments to work together on measures to prevent caller ID spoofing.International traceback mechanisms are needed to track down and identify the origin of spoofed calls.https://www.europol.europa.eu/media-press/newsroom/news/fake-number-real-damage-europol-urges-action-against-caller-id-spoofing
  • OF COURSE THE CVE WEBSITE DOESN'T WORK ON FIREFOX

    Uncategorized
    2
    0 Votes
    2 Posts
    0 Views
    @hipsterelectron I wonder how many CVEs have been filed against the CVE website