From the course: Ethical Hacking: The Complete Malware Analysis Process
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Sandboxing malware
From the course: Ethical Hacking: The Complete Malware Analysis Process
Sandboxing malware
- [Instructor] Sandboxing is a technique used to allow a piece of software to execute in a contained environment, where it can do no damage. The environment does however need to look real to the software, so its normal behavior can be watched. That behavior might be entirely benign, in which case, it's likely that the software isn't malware. However, if malware behavioral characteristics are detected, then the software can be deleted or quarantined. Enterprises can automatically incorporate sandboxing into their perimeter defenses using next-generation firewalls with advanced sandboxing features. Let's have a look at a few. An example of a sandboxing advanced firewall is SonicWall, which incorporates a cloud capture advanced threat protection feature. This capability consists of multiple analysis engines, which analyze a range of attachments, such as PDFs, Word documents, executables, and DLLs, and JAR files, and Android APKs. The engines can detect known signature malware and can…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.