Chapter 3. Building a Sandbox

Solutions in this chapter:

  • Sandbox Background
  • Existing Sandbox Implementations
  • Describing CWSandbox
  • Creating a Live DVD with VMware and CWSandbox
  • Summary
  • Solutions Fast Track
  • Frequently Asked Questions

Introduction

There are several ways to obtain information about malware and in particular bot applications, as seen in the book, Botnets—The Killer Web App (Syngress 2007). Much of this chapter has been adapted from the contribution of Carsten Willem to the Botnet book. One approach is to analyze suspected malware by executing them in a so-called sandbox. Through this analysis we hope to learn more about its internals, the underlying communication method and infrastructure. Sandboxes are a common concept in computer ...

Get Virtualization for Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.