Hi Christian,

We've also started tuning our exclusion lists for IE7 as well -- XPSP2
so far (not Vista).  Here's the corresponding link to the source:
http://www.honeyclient.org/trac/browser/honeyclient/trunk/thirdparty/ca
pture-mod

I was curious if there were any plans to incorporate 'prioritization'
into the .exl language, so that rules could be evaluated in order,
rather than have all the minus [-] rules take precedent over all plus
[+] rules, regardless of the order of how the rules appear in each
file.  This might be related to ticket #713 -- not sure.

Also, we've published a VM Hardening Guide that may be useful for those
trying to reduce cross-contamination issues between host/VM
environments:
http://www.honeyclient.org/trac/wiki/VMHardeningGuide

Feel free to use/extend.  Comments/suggestions are welcomed.

Regards,
-- Darien

>-----Original Message-----
>From: [EMAIL PROTECTED] [mailto:capture-hpc-
>[EMAIL PROTECTED] On Behalf Of Christian Seifert
>Sent: Friday, April 04, 2008 12:20 PM
>To: General discussion list for Capture-HPC users
>Subject: Re: [Capture-HPC] Virtualisation and Emulation Detection
>Importance: Low
>
>Jamie - I see you are running VistaIE7...would you mind forwarding
>the exclusion list to the group? I had a couple of inquiries on this
>from people using Capture...
>Cheers -
>Christian
>
>
>On Fri, Apr 4, 2008 at 1:59 AM, Jamie Riden <[EMAIL PROTECTED]>
>wrote:
>
>
>       (I didn't write Capture, so I'm only commenting on a few
>matters)
>
>
>       >  And how you make sure that the server on which malware is
>       >  hosted do not block your ip addresse?
>
>
>       This is an interesting question - personally I would only
>crawl a URL
>       once per IP of honeypot, so if we have 3 honeyclients
>XPSP2IE6,
>       XPSP2IE7 and VistaIE7, they would need to have separate IP
>addresses
>       to make a sensible test of a potentially malicious site.
>
>       The other option would be to use some kind of proxying.
>
>
>       >  What about malware which needs user interaction to become
>installed?
>
>
>       I believe you can run this through Capture BAT if you want to
>analyze
>       it in the same manner - though there are plenty of other
>solutions for
>       this type of malware. (cwsandbox , norman sandbox, etc...)
>
>       cheers,
>        Jamie
>       --
>       Jamie Riden / [EMAIL PROTECTED] / [EMAIL PROTECTED]
>       UK Honeynet Project: http://www.ukhoneynet.org/
>
>       _______________________________________________
>       Capture-HPC mailing list
>       Capture-HPC@public.honeynet.org
>       https://public.honeynet.org/mailman/listinfo/capture-hpc
>
>
>
>
>
>--
>----
>Web: http://www.mcs.vuw.ac.nz/~cseifert
>
>PGP key
>http://www.mcs.vuw.ac.nz/~cseifert/pgpkey.txt
>Primary key fingerprint: E979 0D9A 9187 D821 F86F B712 C8DB 0583
>B046 BAEF
_______________________________________________
Capture-HPC mailing list
Capture-HPC@public.honeynet.org
https://public.honeynet.org/mailman/listinfo/capture-hpc

Reply via email to