Advice Request How effective is Shadow Defender as a malwarehub tester?

Please provide comments and solutions that are helpful to the author of this topic.

Status
Not open for further replies.
N

Noxx

Thread author
I'm not personally interested in running a virtual machine, but I'm interested in testing some malware. Would Shadow Defender be sufficient enough (alongside a lot of other protection) to do that? If not, I won't even bother unless I eventually get around to setting up a VM. Thanks for any feedback.

- Noxx
 
H

hjlbx

Thread author
I'm not personally interested in running a virtual machine, but I'm interested in testing some malware. Would Shadow Defender be sufficient enough (alongside a lot of other protection) to do that? If not, I won't even bother unless I eventually get around to setting up a VM. Thanks for any feedback.

- Noxx

Shadow Defender is sufficient to protect physical system from persistent infection.

However, some malwares will not start their malicious actions until after a system restart - and in that case the malware will be gone.

I have used Shadow Defender for a lot of malware testing without any problems.

It is recommended not to use hard reboot since some files can remain on system; use on\off button only as a last recourse to exit Shadow Mode if Shadow Mode is frozen.
 
I

illumination

Thread author
If you will be doing this on a production machine keep in mind, while Shadow Defender is solid, it will not stop the malware from connecting outbound with your personal information.
It has been said in the past that certain rootkits can bypass SD, but I have actually not seen anything get by it yet, but like everything, there is a possibility.
 

Der.Reisende

Level 45
Honorary Member
Top Poster
Content Creator
Malware Hunter
Dec 27, 2014
3,423
I use SD too for hub testing (about 1,5 months with it now), has served me well till now (had a TeslaCrypt ransomware infection during the testing period, also some bootkits and other nasty PUP stuff... All clean - confirmed by HMP, QTS360 full scan, ZAM Premium full scan and some MBR tool after a simple restart).
Impressed by the tool and trust it.

@hjlbx: How to understand that (sorry :)): It is recommended not to use hard reboot since some files can remain on system; use on\off button only as a last recourse to exit Shadow Mode if Shadow Mode is frozen.
Am I right it is ok (safe) to just shut down / restart PC as you would do it normally (by Windows Menu for example) and only press the power button for longer time to "kill" the current, frozen [Windows] session?

EDIT: @illumination is absolutely right with this statement.
My (old) malware testing PC isn't a production machine.
 
D

Deleted member 2913

Thread author
Restart or Shutdown, any works with SD to revert to clean or Restart is required i.e if you shutdown & start then a further restart is required?
 

Rishi

Level 19
Verified
Honorary Member
Top Poster
Well-known
Dec 3, 2015
938
Shadow mode starts in two ways : manual or on Boot and ends in one way : a system shutdown(which is accomplished by restart/reboot also)

Screenshot

Yes data transmission and network protection is not covered by SD, so best way to implement is use on an old machine(which can/cannot supportVM) with no personal data and a separate connection/ no networking to avoid mishaps.
 
Last edited:

jamescv7

Level 85
Verified
Honorary Member
Mar 15, 2011
13,070
Definitely effective against any threats, considering that Shadow Defender is a full proof of concept to avoid any leakage and issues. And so far from many numerous reviews conducted on Youtube and others, its too unreliastic where usually its a human error when mishandle SD.
 
Status
Not open for further replies.

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top