Windows builtin Sandbox for Reverse Engineering #7818
Unanswered
jhelb1993
asked this question in
Show and tell
Replies: 0 comments
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
For Reversing Malware, CTF's, or any other file i don't trust, i created a sandbox configuration (.wsb), you can use the Windows Sandbox (For Windows 11 Pro users and better, not for the Home Edition) like a VM, but on exit, it looses all data. Well, i found a way so that i don't have to install Binary Ninja or update the license everytime i start the sandbox.
Start this wsb file, start binary ninja, register your license, and close the sandbox.
Now, we want start Binary Ninja automatically with the Sandbox, and disable write access to
C:\Users\WDAGUtilityAccount\AppData\Roaming\Binary NinjaDepending on the situation, you can also adjust this configuration to remove the network connection:
You might need to copy some DLL files from C:\Windows\System32 into the BinaryNinja installation folder! You'll get a message saying that DLL files are missing.
For use Binary Ninja on the Hostmachine and in the Sandbox, just rename the
C:\Users\YOUR_USERNAMEl\AppData\Roaming\Binary Ninjato
C:\Users\YOUR_USERNAMEl\AppData\Roaming\Binary Ninja Sandboxand update the .wsb file:
Hope it's useful for someone!
Cheers!
Screenshot:
Beta Was this translation helpful? Give feedback.
All reactions