Skip to Content
Malware Development for Ethical Hackers
book

Malware Development for Ethical Hackers

by Zhassulan Zhussupov
June 2024
Beginner
402 pages
8h 34m
English
Packt Publishing
Content preview from Malware Development for Ethical Hackers

6

Navigating Anti-Virtual Machine Strategies

Anti-virtual machine techniques are predominantly found in widely spread malware, such as bots, scareware, and spyware, mainly because honeypots often use virtual machines and these types of malware generally target the average user’s computer, which is unlikely to be running a virtual machine. In this chapter, you will learn how to employ anti-virtual machine (anti-VM) strategies to counteract attempts at analysis.

In this chapter, we’re going to cover the following main topics:

  • Filesystem detection techniques
  • Approaches to hardware detection
  • Time-based sandbox evasion techniques
  • Identifying VMs through the registry

Technical requirements

In this book, I will use the Kali Linux (https://www.kali.org/ ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Evasive Malware

Evasive Malware

Kyle Cucci
The Complete Ethical Hacking Course

The Complete Ethical Hacking Course

Codestars By Rob Percival, Atil Samancioglu
Practical Malware Analysis

Practical Malware Analysis

Michael Sikorski, Andrew Honig

Publisher Resources

ISBN: 9781801810173Supplemental Content