zlacker

[parent] [thread] 4 comments
1. yjftsj+(OP)[view] [source] 2022-07-09 20:12:20
You work in cybersecurity and want more exposure between the host and the guest? You have a very different risk tolerance than I would in your shoes
replies(1): >>neodym+1v
2. neodym+1v[view] [source] 2022-07-10 00:38:49
>>yjftsj+(OP)
If I'm doing real malware execution and analysis, I would one- way transfer the relevant file(s) to my sandbox and disable any backward connectivity before execution, but I still need a reasonably simple way of getting files to (suspicious files, etc) and from (resulting logs, registry changes, pcap, etc) the malware sandbox. Ive kinda solved this already using a number of tools outside my work host, but just in the off situations where this is necessary I want to have a template VM prepped in advance.
replies(1): >>s_ting+xw
◧◩
3. s_ting+xw[view] [source] [discussion] 2022-07-10 00:57:51
>>neodym+1v
https://wormhole.app/
replies(1): >>bzmrgo+931
◧◩◪
4. bzmrgo+931[view] [source] [discussion] 2022-07-10 08:37:55
>>s_ting+xw
I second this, it's called magic wormhole, if you want the source, croc is a more friendly solution built ontop of magic wormhole. In any event, quick and easy.
replies(1): >>0xCMP+Etg
◧◩◪◨
5. 0xCMP+Etg[view] [source] [discussion] 2022-07-14 22:29:17
>>bzmrgo+931
PSA: wormhole.app and magic wormhole are not the same

If you want to use the well known magic wormhole then visit the repo for instructions: https://github.com/magic-wormhole/magic-wormhole

The current supported version is a python cli app. A rust version is being developed, but last I checked was not considered ready.

[go to top]