Help with ¿FP?

Discussion in 'other anti-virus software' started by guest, Feb 16, 2010.

Thread Status:
Not open for further replies.
  1. Sadeghi85

    Sadeghi85 Registered Member

    Joined:
    Dec 20, 2009
    Posts:
    747
  2. guest

    guest Guest


    Well, i dont use to play with this kind of files, since there is always a free software for everything, but this time I have curiosity how the profesionals check the suspicious files, but I dont know if in this forums I can find the answer.
     
  3. AvinashR

    AvinashR Registered Member

    Joined:
    Dec 26, 2009
    Posts:
    2,063
    Location:
    New Delhi Metallo β-Lactamase 1
    I guess you have already found your answer, but it seems you are not satisfied with the answers...:rolleyes: Even you have verified this file on CIMA, but still you are unsure, i guess.
     
  4. guest

    guest Guest

    Again, I am sure that is clean but I want to know... just read my last 3 post and you will know it.
     
  5. Seer

    Seer Registered Member

    Joined:
    Feb 12, 2007
    Posts:
    2,068
    Location:
    Serbia
    They execute a file in a VM, then monitor activities with IDS/IPS.
    Another way would be reverse engineering (disassembling), but this is not always possible.
     
  6. AvinashR

    AvinashR Registered Member

    Joined:
    Dec 26, 2009
    Posts:
    2,063
    Location:
    New Delhi Metallo β-Lactamase 1
    Seer, you have taken my words:D ....

    Reverse engineering is the only best possible option left, but keep in mind that it will be too hard as because these cracking groups always use protection for their keygens...
     
  7. andyman35

    andyman35 Registered Member

    Joined:
    Nov 2, 2007
    Posts:
    2,336
    Personally I'd never use a keygen since I'm obsessive about finding free alternatives/promo offers for anything that I'm not prepared to pay a licence fee for.
    Having said that,the only way I'd ever execute a keygen would be sandboxed.I'm probably paranoid but the way I see it these things are by definition riskware.
     
  8. fax

    fax Registered Member

    Joined:
    May 30, 2005
    Posts:
    3,899
    Location:
    localhost
    ...combined with BSA to analyze the behavior of the keygen... :)
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.