Reader small image

You're reading from  Mastering Reverse Engineering

Product typeBook
Published inOct 2018
PublisherPackt
ISBN-139781788838849
Edition1st Edition
Tools
Right arrow
Author (1)
Reginald Wong
Reginald Wong
author image
Reginald Wong

Reginald Wong has been in the software security industry for more than 15 years.Currently, Reggie is a lead anti-malware researcher at Vipre Security, a J2 Global company, covering various security technologies focused on attacks and malware. He previously worked for Trend Micro as the lead for the Heuristics team, dealing with forward-looking malware detection. Aside from his core work, he has also conducted in-house anti-malware training for fresh graduates. He is currently affiliated with CSPCert.ph, Philippines' CERT, and is a reporter for Wildlist.org. He has also been invited to speak at local security events, including Rootcon.
Read more about Reginald Wong

Right arrow

Analysis environments


The environment setup in reverse engineering is crucial to the result. We need a sandbox environment where we can dissect and play with the file, without worrying that we may break something. And since the most popular operating systems are Microsoft Windows and Linux, let's discuss using these operating systems in a virtual environment.

Virtual machines

From the first chapter, we introduced using VirtualBox as our desktop virtualization system. The reason we chose VirtualBox was because of it being freeware. But besides VirtualBox, choosing the right sandboxing software depends on user preferences and requirements. There are pros and cons for every piece of sandboxing software, so it is worth exploring those on offer to find out which software you prefer. Here's a small list of virtualization software:

  • VMWare Workstation: This is a commercial, and widely popular, piece of virtualization software. VMWare Workstation can be downloaded from https://www.vmware.com.
  • VirtualBox...
lock icon
The rest of the page is locked
Previous PageNext Page
You have been reading a chapter from
Mastering Reverse Engineering
Published in: Oct 2018Publisher: PacktISBN-13: 9781788838849

Author (1)

author image
Reginald Wong

Reginald Wong has been in the software security industry for more than 15 years.Currently, Reggie is a lead anti-malware researcher at Vipre Security, a J2 Global company, covering various security technologies focused on attacks and malware. He previously worked for Trend Micro as the lead for the Heuristics team, dealing with forward-looking malware detection. Aside from his core work, he has also conducted in-house anti-malware training for fresh graduates. He is currently affiliated with CSPCert.ph, Philippines' CERT, and is a reporter for Wildlist.org. He has also been invited to speak at local security events, including Rootcon.
Read more about Reginald Wong