From the course: Ethical Hacking: The Complete Malware Analysis Process

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Sandboxing malware

Sandboxing malware

From the course: Ethical Hacking: The Complete Malware Analysis Process

Start my 1-month free trial

Sandboxing malware

- [Instructor] Sandboxing is a technique used to allow a piece of software to execute in a contained environment, where it can do no damage. The environment does however need to look real to the software, so its normal behavior can be watched. That behavior might be entirely benign, in which case, it's likely that the software isn't malware. However, if malware behavioral characteristics are detected, then the software can be deleted or quarantined. Enterprises can automatically incorporate sandboxing into their perimeter defenses using next-generation firewalls with advanced sandboxing features. Let's have a look at a few. An example of a sandboxing advanced firewall is SonicWall, which incorporates a cloud capture advanced threat protection feature. This capability consists of multiple analysis engines, which analyze a range of attachments, such as PDFs, Word documents, executables, and DLLs, and JAR files, and Android APKs. The engines can detect known signature malware and can…

Contents