Why not download all the malware and then test it on a computer that you don't use anymore?
That's all we can ever hope for. Nothing is certain, all we can do is try to minimize risk.Hotrod123 said:I do, but I wish it didnt have to be this way. You have seen me constantly browse various forums for the best configuration, and after many opinions and ideas I feel like I have found the perfect blend between testing and security(sorry for all the I's).
That's what we're here for.Hotrod123 said:Anyway, thanks for all your help and if I need any more answers you will be sure to be hearing from me again.
I did not realize who I was responding to earlier( really enjoyed watching your vids). Through all of your extensive testing, have you ever had an issue with malware escaping the VM?MrXidus said:You'll notice I did say NAT under the picture.
So that is very reasurring. Even though there is a risk, that risk hasn't been exploited by hackers yet. When testing, how was the state of the other machines on your network?MrXidus said:Nope. That goes for all my 5 years of testing all types of malicious software in a VM.
First of all welcome to MalwareTips.comkreto said:hi
i am new at this i have a spare pc will ubuntu and virtualbox be a better choice for malware testing
i there a good link to malware testing do and don´ts
Running virtual machines using an Ubuntu host for malware testing is a good practice in my opinion.kreto said:the pc will only be used for testing malware and from what i can read ubuntu host (linux) is reasonable immune to malware ubuntu get update often so cd image hmmmm
is the there at good site on malware testing do and don`t or is it learning by doing