A sandbox is a security mechanism for containing and restricting untrusted programs. Such programs could contain malicious code, which would otherwise harm the user's system.
Questions tagged [sandbox]
195 questions
1
vote
0 answers
Avast Sandbox Waking Computer from Sleep in Windows 10. Avast 2016 premium version
I typed in powercfg /lastwake into cmd and it told me an avast sandbox .exe had woken the computer. I've disabled sandbox and it no longer constantly wakes from sleep - within 30 seconds. I scanned it for viruses in linux using clamav and nothing…
![](../../users/profiles/61145.webp)
USER874897
- 77
- 3
1
vote
0 answers
Where can I find live browser exploits to test my sandbox?
I've just built a custom sandbox, and I'm happy with the way it processes samples that I upload directly. Now I'd like to work on "drive-by" browser exploits, but I'm not sure how to go about testing it. Is anyone aware of any public feed of URLs…
![](../../users/profiles/13842.webp)
Sean W.
- 835
- 4
- 14
0
votes
3 answers
Isolate part of my PC to keep security for online purchases?
Soon I'll doing some purchases online using my mother's credit card. She's pretty sceptical about online shopping but I convinced her. She's not so sure about how secure it is and since I'm not so sure if I have some malware running on my PC, I want…
0
votes
2 answers
Is there something like a “Windows Sandbox software Wrapper”?
I am facing the following problematic: I want people to send me softwares they develop, then I want to share them to other people, in sandboxed mode, that is to say with no need to have a sandbox software...
For example, you have softwares that can…
![](../../users/profiles/5539.webp)
GianT971
- 109
- 3
0
votes
3 answers
What Mechanisms Keep Network Processes (and Applications) Sandboxed
This question stems from my other question, sorry if it is too similar. Now I would like to know what mechanism is used to sandbox network processes and (if relevant) individual programs, if at all?
Obviously, if the local machine is comporomised…
![](../../users/profiles/61842.webp)
user58446
- 513
- 6
- 13
0
votes
1 answer
Virtual Penetration Test Lab - Figuring Out Its Market Size
Is there any reliable data available based on which the Global Market Size of Virtual Pen Testing Labs ( or Cyber Ranges ) can be ascertained ?
If NOT , is it possible to calculate it ?
user52380
0
votes
1 answer
Sandbox environment for "php malware" analysis
I would like to know how can I analyse an obfuscated malware php code ?
I heard about cuckoo sandbox, but it seems too overwhelming for this particular task.
So I decided to run a Vagrant box, install php-cli, tcpdump, ... run the php code and look…
![](../../users/profiles/54126.webp)
kondor
- 229
- 2
- 6
0
votes
1 answer
How do i protect my self from "Form grabbing" attack?
I'm writing a simple piece of security software - I'm interested in attack techniques and especially in how to protect my users from this attack?
From wiki I can see how its works: it hooks the API call of the browser before sending data.
It's a…
![](../../users/profiles/16769.webp)
Marwen Trabelsi
- 133
- 1
- 9
0
votes
0 answers
How do I recklessly browse the web, download suspicious files and run them with as low a risk as possible?
I have recently found out about the existence of virtual machines they can be used to run viruses in an isolated environment from the host computer, like virtual box, vmware and sandboxie. However, I'm told that viruses can still escape the VM…
![](../../users/profiles/282318.webp)
Ryou Kei
- 1
0
votes
1 answer
How much secure are modern browsers?
Modern web browsers like Firefox, Chrome and Chromium based browsers are getting new features everyday. They also have PWA. Unlike Android, browsers on Windows, MacOS, Linux and BSD don't run inside containers. So, the webapp can gain access to the…
![](../../users/profiles/281798.webp)
Noob
- 1
0
votes
1 answer
How to store malware for analysis?
I am planning on analysing some malware samples dynamically using a sandbox tool and a target Windows VM. The host (physical machine) runs Ubuntu and in it are the sandbox and target VM.
So far I only analysed benign samples, i.e. normal software. I…
![](../../users/profiles/232403.webp)
Marcus
- 1,145
- 1
- 8
- 12
0
votes
0 answers
what are the risk associated with installing flatpaks at user level
flatkill has been floating around for a while, and honestly it was the reason I was personally resistant to using flatpak packages for a while.
I'm wondering though, most of the article is written from the perspective that you are installing flatpak…
![](../../users/profiles/273584.webp)
Joshua Ferguson
- 1
- 1
0
votes
0 answers
Is there a more convenient, yet safe, way to run DOSBox-X than I'm currently doing it?
I recently learned about DOSBox-X. It's basically a somewhat less awful version of the basically-abandoned DOSBox.
I currently have it installed inside a Windows 10 VM inside of my Windows 10 bare metal PC. It's the only computer I have. If I could…
![](../../users/profiles/265272.webp)
Kalo
- 1
0
votes
1 answer
How does Chromium's sandboxing compare to Firejail's?
I am increasingly being requested to join videoconferences through Zoom, which I don't trust to run on my machine. I understand that there are two common ways of sandboxing this software: you can either download the standalone Zoom application and…
![](../../users/profiles/73462.webp)
Psychonaut
- 615
- 4
- 14
0
votes
1 answer
Seeking recommendations/warnings for creating a server for malware sample upload and analysis
I am trying to conceptualize a server where users can upload potentially dangerous malware samples to a server. They would not need to be stored in the file system per se but kept in memory long enough to be analyzed by other programs/libraries.…
![](../../users/profiles/244396.webp)
user2726232
- 1
- 1