Skip to main content

REMnux - A Linux Distribution for Reverse Engineering Malware

remnux by vyc0d

Setelah sekian lama gk posting, akhirnya sempet jg nulis di blog :p
Kali ini gw sekedar share OS khusus dibuat untuk malware reverse-engineering, recomended dari ane nih.wekeke
REMnux yang distribusikan khusus pada Linux telah dirilis sampai v4. Sistem operasi ini berfungsi untuk melakukan malware reverse-engineering, termasuk alat untuk melakukan analisis forensik pada memori serta analisis file PDF yang berpotensi berbahaya.
REMnux pertama kali dirilis tahun 2011 dan merupakan karya Lenny Zeltser, seorang ahli malware dan instruktur SANS. Remnux dirancang untuk menciptakan suatu lingkungan mandiri yang menganalisis dan melakukan malware reverse-engineering, aplikasi berbahaya lainnya dan website. File ini dapat di download secara terpisah dan di jalankan melalui CD atau virtual drive.
Ada dua fitur baru pada REMnux yang baru di rilis ini yaitu Origami Framework, yang dapat digunakan untuk menganalisis file-file PDF yang berbahaya. Dan yang kedua adalah Volatility Framework yaitu untuk melakukan analisis forensik pada memori. Selain fitur fitur tersebut, REMnux versi 4 ini dilengkapi juga dengan fitur-fitur lain.
Beberapa diantaranya adalah:
- Untuk analisis jaringan: NetworkMiner, ngrep, pdnstool
- Analisis PDF: PDF X-Ray Lite (pdfxray_lite dan swf_mastah),peepdf
- Analisis JavaScript: Chrome JavaScript mesin (D8),js-beautify, dan untuk
- Meneliti file: Hachoir (hachoir-subfile, hachoir-metadata,hachoir-urwid), pyew, densityscout, findaes.
- dan lain2

Pada versi terbaru REMnux ini juga di sertakan manual yang memberikan pengguna beberapa petunjuk tentang cara untuk memulai dan perintah-perintah yang mendukung untuk menjalankan operasi.

Download REMnux v4 .ISO

Comments

Popular posts from this blog

Fix HTTPS issue in browser - Burp Suite

If you get message "Software is Preventing Firefox From Safely Connecting to This Site. Most likely a safe site, but a secure connection could not be established. This issue is caused by The original certificate provided by the web server is untrusted., which is either software on your computer or your network." lets see the tutorial. 1. With Burp suite running, visit http://burp in your browser and click the "CA Certificate" link to download and save your Burp CA certificate. Remember where you save the Burp CA certificate.

How To Enable DNS over HTTPS

  DNS over HTTPS (DoH) is a protocol for performing remote Domain Name System (DNS) resolution via the HTTPS protocol. A goal of the method is to increase user privacy and security by preventing eavesdropping and manipulation of DNS data by man-in-the-middle attacks by using the HTTPS protocol to encrypt the data between the DoH client and the DoH-based DNS resolver. An alternative to DoH is the DNS over TLS (DoT) protocol, a similar standard for encrypting DNS queries, differing only in the methods used for encryption and delivery. On the basis of privacy and security, whether or not a superior protocol exists among the two is a matter of controversial debate, while others argue the merits of either depend on the specific use case. Benefits DoH improves privacy by hiding domain name lookups from someone lurking on public WiFi, your ISP, or anyone else on your local network. DoH, when enabled, ensures that your ISP cannot collect and sell personal information related to your browsi

Artillery - Binary Defense Project

Project Artillery is an open source project aimed at the detection of early warning indicators and attacks. The concept is that Artillery will spawn multiple ports on a system giving the attacker the idea that multiple ports are exposed. Additionally, Artillery actively monitors the filesystem for changes, brute force attacks, and other indicators of compromise. Artillery is a full suite for protection against attack on Linux and Windows based devices. It can be used as an early warning indicator of attackers on your network. Additionally, Artillery integrates into threat intelligence feeds which can notify when a previously seen attacker IP address has been identified. Artillery supports multiple configuration types, different versions of Linux, and can be deployed across multiple systems and events sent centrally. Artillery is a combination of a honeypot, monitoring tool, and alerting system. Eventually this will evolve into a hardening monitoring platform as well to detect ins