Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?
Security Operating Systems Ubuntu Worms Linux

REMnux, the Malware Analysis Linux OS 58

Trailrunner7 writes "A security expert has released a stripped-down Ubuntu distribution designed specifically for reverse-engineering malware. The OS, called REMnux, includes a slew of popular malware-analysis, network monitoring and memory forensics tools that comprise a very powerful environment for taking apart malicious code. REMnux is the creation of Lenny Zeltser, an expert on malware reverse engineering who teaches a popular course on the topic at SANS conferences. He put the operating system together after years of having students ask him which tools to use and what works best. He originally used Red Hat Linux, but recently decided that Ubuntu was a better fit. REMnux has three separate tools for analyzing Flash-specific malware, including SWFtools, Flasm and Flare, as well as several applications for analyzing malicious PDFs, including Didier Stevens' analysis tools. REMnux also has a number of tools for de-obfuscating JavaScript, including Rhino debugger, a version of Firefox with NoScript, JavaScript Deobfuscator and Firebug installed, and Windows Script Decoder."
This discussion has been archived. No new comments can be posted.

REMnux, the Malware Analysis Linux OS

Comments Filter:
  • Reminds me of... (Score:1, Interesting)

    by sirrunsalot ( 1575073 ) on Friday July 09, 2010 @03:42PM (#32854142)
    Reminds me of Damn Vulnerable Linux [] although that one's just for learning purposes, not for fighting what's out there.
  • by SEE ( 7681 ) on Friday July 09, 2010 @03:55PM (#32854294) Homepage

    Code which depends on the virtual environment leaving clues the malware's code can detect. Code which also can be disabled by (for example) putting a jump instruction in the right place in the binary.

  • by 99BottlesOfBeerInMyF ( 813746 ) on Friday July 09, 2010 @04:37PM (#32854832)

    Malware often uses low-level code and tricks which makes them break when they are being run in an emulator. They also often have checks and tricks in place to detect if they are being run in a virtual machine and either crash itself or act differently. How do you run Windows executables with this so that they actually work normally?

    While some malware detects VMs and some fails to run in VMs, not much that I've seen detects VMs then behaves significantly differently or intentionally refuses to run. The Conficker family, for example, detects VMs, then reports on connection to the control channel that it is a VM in addition to the other system info.

    As to working around this problem, the way I've seen it done is expensive hardware designed for the purpose, that lets you analyze what is happening from a "watcher" machine and revert the machine once you are done. This was being used in a network security company to analyze the behavior of worms.

  • Re:Reminds me of... (Score:3, Interesting)

    by Runaway1956 ( 1322357 ) on Friday July 09, 2010 @09:25PM (#32857286) Homepage Journal

    Yep. Backtrack seems better than an Ubuntu, for a pentesting suite, I think.

    I like Ubuntu, and I've installed it at the house, because the wife likes it too. But, for pentesting and analysis, you just don't need, or even want, all the pretties and the extra libraries and apps that Ubuntu lugs around as baggage.

    Backtrack doesn't have EVERYTHING a guy might want for every purpose - or it didn't the last time I looked - but you can easily install anything that you need.

Competence, like truth, beauty, and contact lenses, is in the eye of the beholder. -- Dr. Laurence J. Peter