Malware analysis lab
Posted: 13. Jul 2017, 16:34
Hi,
I am looking to build a malware analysis lab. I am currently running Virtualbox on a Linux host and came here for some tips on how to best design given my use case.
Physical Hardware
PC tower with 3 physical NICs and 16GB RAM
Linux MINT 18.1 host OS
Guest Environment
- Security Onion
- Windows 7
- Kali Linux
Requirements
- Isolation from my LAN
- Internet Access for Security Onion and Kali VM's
- The ability to sniff traffic from my capture interface on the Security Onion VM. (Promiscuous mode)
My main concern so far from what I've read is what network configuration supports promiscuous mode for sniffing. I've read some threads that say it requires Bridged Mode but it is not clear. Would I be able to use my Security Onion VM to sniff on an Internal or Host-Only network?
Suggestions appreciated.
I am looking to build a malware analysis lab. I am currently running Virtualbox on a Linux host and came here for some tips on how to best design given my use case.
Physical Hardware
PC tower with 3 physical NICs and 16GB RAM
Linux MINT 18.1 host OS
Guest Environment
- Security Onion
- Windows 7
- Kali Linux
Requirements
- Isolation from my LAN
- Internet Access for Security Onion and Kali VM's
- The ability to sniff traffic from my capture interface on the Security Onion VM. (Promiscuous mode)
My main concern so far from what I've read is what network configuration supports promiscuous mode for sniffing. I've read some threads that say it requires Bridged Mode but it is not clear. Would I be able to use my Security Onion VM to sniff on an Internal or Host-Only network?
Suggestions appreciated.