Книга: Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Назад: Vulnerable Instructions
Дальше: Escaping the Virtual Machine

into the virtual machine’s .vmx file will make the virtual machine less detectable.

The directexec parameter causes user-mode code to be emulated, instead of being run directly on the CPU, thus thwarting certain anti-VM techniques. The first four settings are used by VMware backdoor commands so that VMware Tools running in the guest cannot get information about the host.

These changes will protect against all of ScoopyNG’s checks, other than the sixth, when running on a multiprocessor machine. However, we do not recommend using these settings in VMware, because they disable the usefulness of VMware Tools and they may have serious negative effects on the performance of your virtual machines. Add these options only after you’ve exhausted all other techniques. These techniques have been mentioned for completeness, but modifying a .vmx file to try to catch ten of the potentially hundreds of ways that VMware might be detected can be a bit of a wild-goose chase.

sss
sss

© RuTLib.com 2015-2018