Setting up an UNDETECTABLE VM for Malware Analysis

Поділитися
Вставка
  • Опубліковано 25 лис 2024

КОМЕНТАРІ • 314

  • @Beetlebugoid
    @Beetlebugoid 5 місяців тому +208

    1:55 "lain" ...Obviously

    • @lainpilled
      @lainpilled 5 місяців тому +16

      and navi haha

    • @umzfbupzvatg1916
      @umzfbupzvatg1916 5 місяців тому +6

      ​@@lainpilled i thought i was the only one who names my hostnames navi lol, i even made copland os grub and sddm theme

    • @trajectoryunown
      @trajectoryunown 5 місяців тому

      ​@@umzfbupzvatg1916 I call mine NAVI too!

    • @debil3206
      @debil3206 4 місяці тому +4

      let's all love lain :)

    • @Dayreaverthe_Theo
      @Dayreaverthe_Theo 3 місяці тому

      @@debil3206 TOKYOPILL MENTIONED GRAHHH

  • @Astrid--
    @Astrid-- 5 місяців тому +301

    Tip:
    If you have relatives or friends that would fall for malware or scams, do the reverse of this video and make their PC look like a VM :3

    • @EasternAnalogue1289
      @EasternAnalogue1289 5 місяців тому +31

      That... Might actually be a good idea!!

    • @Yarpopcat08
      @Yarpopcat08 5 місяців тому

      I believe I actually saw a github project, that did exactly that) Sadly, I don't remember it's name anymore

    • @biigsmokee
      @biigsmokee 5 місяців тому +33

      Scammers tend to destroy the VM when they see it's a VM so..

    • @JustLinuxMan
      @JustLinuxMan 5 місяців тому +5

      ​@@biigsmokeereally? Any example you may have?

    • @EasternAnalogue1289
      @EasternAnalogue1289 5 місяців тому +12

      @@JustLinuxMan Edit: This comment was a misunderstanding. my bad. He didn't mean it in a mean way. I choose to keep it here because I shouldn't hide my mistakes.
      "Literally anywhere on UA-cam, 'Scammer Destroys VM'? You can't invalidate someone's argument just because you were too lazy to find the proof yourself."

  • @kabooki22
    @kabooki22 5 місяців тому +286

    Yes, I'm totally here for a tutorial and NOT just here because it was in my recommended.

  • @JoeyGarvey
    @JoeyGarvey 5 місяців тому +338

    there was a video that Jim Browning did on creating an undetectable VM for scambaiting , but it's a bit outdated and I couldn't really find a tutorial for once ever since. Thank you!!

    • @EricParker
      @EricParker  5 місяців тому +118

      The needs for that are different. Malware (except for very advanced cases) just scans a few strings, humans use different heuristics.

    • @leslyschafer1879
      @leslyschafer1879 5 місяців тому +46

      ​@@EricParkerIf it's truly undetectable, try running Valorant with vanguard.

    • @nothappyz
      @nothappyz 5 місяців тому

      @@leslyschafer1879 if you'd seen the video you'd know that it does not support vanguard-level anticheats

    • @DianRBLX
      @DianRBLX 5 місяців тому

      @@leslyschafer1879 3:56

    • @trimidsmod6391
      @trimidsmod6391 4 місяці тому

      @@leslyschafer1879 dude said it's not detected for most things, he never said it's not detected for everything

  • @middyjohn
    @middyjohn 5 місяців тому +243

    If it can't run in a vm, its gotta be malware lol
    AntiCheats: sweats profusely

  • @SaarN1337
    @SaarN1337 5 місяців тому +12

    It's always interesting to see VMs,Linux and Windows being used for new things - like security. I really enjoy watching your content.

    • @ikcikor3670
      @ikcikor3670 5 місяців тому

      I am quite sure 99% of Cyber security ever was done on either Windows or Linux

  • @XylonXD
    @XylonXD 5 місяців тому +45

    GOAT level timing with RATs everywhere now.

  • @jonctr
    @jonctr 5 місяців тому +4

    Thanks just what I wanted - had a feeling that some downloads were not fully active under my normal VM

  • @der.Schtefan
    @der.Schtefan 5 місяців тому +7

    Got it. So I will build my Malware to stay dormant unless Windows telemetry is ON and we detect an Nvme

  • @cooolgamer-vanced
    @cooolgamer-vanced 5 місяців тому +4

    Great tutorial! I really like to see virus tests and how they work, as Enderman and Siam Alam does (they're not active anymore it seems...). But it's nice to see someone else doing the same thing and going deeper into the analysis than them :)

  • @joopie46614
    @joopie46614 5 місяців тому +8

    It would be great if these VM products provided a way to modify more attributes or be able to mimic a real machine, it's clearly possible to do that, although you likely wouldn't be able to use guest support since that's an easy spot for VM detectors.

  • @typingcat
    @typingcat 5 місяців тому +34

    I'm so glad that I no longer have to use ShutUp10 (awful user interface), because I moved to Linux.

    • @sudonim116
      @sudonim116 5 місяців тому +2

      Welcome!

    • @southernflatland
      @southernflatland 5 місяців тому +2

      Welcome fellow penguin 👍

    • @isheamongus811
      @isheamongus811 5 місяців тому

      Now you have to deal with GNOME:)

    • @LoganDark4357
      @LoganDark4357 5 місяців тому

      @@isheamongus811 how do you know if they use GNOME?

    • @raggebatman
      @raggebatman 5 місяців тому

      ​@@isheamongus811 or choose not to :)

  • @csplxt
    @csplxt 5 місяців тому +8

    been binging your vids recently, keep up the good work man!

  • @WhoooshyYT
    @WhoooshyYT 5 місяців тому +1

    Thank you for this tutorial, Eric! Your instructions were precise, to the point, and easy to understand. I also learned new things along the way because you explained why you were going with certain settings instead of others. I was able to replicate this undetectable VM in my VMware Workstation.

  • @yilong_ma
    @yilong_ma 5 місяців тому

    Been waiting for an up to date video on this topic. Thank you so much Mr Parker!

  • @omgsky-yt
    @omgsky-yt 4 місяці тому +5

    A undetectable KVM tutorial would be appreciated

  • @7chicken
    @7chicken 5 місяців тому +24

    question - what would happen if you configured everything to look like a VM, like a reverse spoof i guess? essentially the opposite of what you're doing in this video? would that be more effective as an antivirus than an antivirus?

    • @V530-15ICR
      @V530-15ICR 5 місяців тому +10

      Depends on the malware. Maybe it doesn't care about if the PC is real or VM.

    • @tpd1864blake
      @tpd1864blake 5 місяців тому +1

      For most malware, it probably won't do anything. For enterprise-grade malware, it might either refuse to run in the VM, or it detects that it's in a VM and uses an exploit to escape into your host system

    • @raskr8137
      @raskr8137 4 місяці тому +1

      I believe there is actually a recent project that does exactly that! Can't remember what it's called though. It's probably not going to be more effective than an antivirus, but nothing's preventing you from using that and a regular antivirus at the same time

    • @KyuDoesCode
      @KyuDoesCode 3 місяці тому

      He handles that in a new video :)

    • @JohnDoe-m8i
      @JohnDoe-m8i 3 місяці тому

      @@raskr8137 Cyber Scarecrow

  • @BlueSheep95
    @BlueSheep95 5 місяців тому +2

    You can use "Shift+g" and "gg" to jump to the top or bottom of a file in Vim.

  • @Decommissioned
    @Decommissioned 5 місяців тому +2

    For rdtsc all you need is a kernel patch, there are already a few online so all you need to do is recompile the Linux kernel with the patch applied.

    • @bait6571
      @bait6571 5 місяців тому

      I read on the unknowncheats forum that pafish's rdtsc check is very basic and the public rdtsc patches usually use pafish to check if they work. Then some anticheats more advanced timing checks which public patches dont fix.

  • @habibidom
    @habibidom 5 місяців тому +1

    Watching you since 17k, all i can say is, keep up the good content brother.

  • @definitelyaraven
    @definitelyaraven 5 місяців тому +2

    OMW to do the reverse of this to make my gaming PC look like a virtual machine to malware

  • @daanmageddon
    @daanmageddon 5 місяців тому +2

    In "more or less" most of the nix apps, shift-g (a capital G) will get you to the end of the output. Maybe that's also true for Vi. I guess entering a number with g just goes to that line number.

    • @c128stuff
      @c128stuff 5 місяців тому +1

      The 'official' way to do this in vi is ":$"

    • @daanmageddon
      @daanmageddon 5 місяців тому +1

      @@c128stuff I checked it out, seems both ":$" and "G" takes you to the beginning of the last line in the file, however not just "g" but "gg" takes you back to the first char in the file, i assumed just g. The "official way" to jump to a line number just seems to be ":n", where n is the line number. Could not find any reference to g combined with a number to jump to that line number, an undocumented feature?

    • @c128stuff
      @c128stuff 5 місяців тому

      @@daanmageddon no idea about g combined with a number.
      : gets you to the line number mentioned. $ just happens to always be the last line. This also works for other commands which accept or require line numbers, for example
      :5,$s/old/new/g will replace every occurance of 'old' with 'new', starting at line 5 upto and including the last line of the file.

  • @qwe-lb9di
    @qwe-lb9di 5 місяців тому

    Literally searched for this two days ago, thanks a lot!

  • @crimson750
    @crimson750 5 місяців тому

    Recently discovered your channel and I love the videos. Keep it up!

  • @SkizzieSpeedruns
    @SkizzieSpeedruns 4 місяці тому +2

    I know i am kinda late to this, but if you actually, before installation select to use BIOS instead of UEFI, you then won't see the Vmware version of bios in system info, but instead you'll see: "Phoenix Technologies LTD 6.00, 11/12/2020" I am also pretty sure that you can then modify the name of the BIOS to your liking. Renaming the BIOS version with the UEFI installation doesn't seem to work, and is still called after Vmware.

    • @euroski516
      @euroski516 4 місяці тому

      where exactly in the part of the video if you dont mind me asking

  • @vladislavkaras491
    @vladislavkaras491 5 місяців тому

    Thanks for the demonstration of some of your stuff!

  • @orngjce223
    @orngjce223 5 місяців тому +2

    You know, this is also a tutorial for how to run certain extremely popular games with invasive anticheats on Linux.

  • @TabbyEgg312
    @TabbyEgg312 5 місяців тому +2

    omg i needed a tutorial for this, absolute great timing

  • @factswithlouis
    @factswithlouis 5 місяців тому +1

    finally perfect tutorial! one time malware get on my computer 😅 im lucky that antyvirus catch it

  • @aaesth
    @aaesth 5 місяців тому +17

    i love lain

  • @dogwater-sz2rc
    @dogwater-sz2rc 9 днів тому +1

    the only problem with this method is that the vm will run like dogshit without vmware tools

  • @_eduard4869
    @_eduard4869 5 місяців тому +1

    Love you Eric best IT man!

  • @shadowjoi1254
    @shadowjoi1254 5 місяців тому +1

    you need to be 3 mil subs keep up the work

  • @Roizor
    @Roizor 5 місяців тому

    you can press “g” in normal mode to go straight to the bottom in neovim!

  • @katykat5099
    @katykat5099 5 місяців тому

    Oh, hey I was wondering about that! Thanks.

  • @Breemskin
    @Breemskin 5 місяців тому +1

    I'm sure this is elsewhere in the comments, but shift+g will take you directly to the bottom of the file in vim

  • @asddsaasdfg2846
    @asddsaasdfg2846 5 місяців тому

    This is so useful thank you!

  • @Xiph1980
    @Xiph1980 5 місяців тому

    For vi shift+G to get to the end. gg to go to the start, and shift+A to append at the end of the line.

  • @c128stuff
    @c128stuff 5 місяців тому

    Changing the disk type for a windows VM is a real pita, but not impossible without full reinstall. Its not worth the hassle usually.

  • @crzyecks
    @crzyecks 5 місяців тому

    I like your malware analysis videos

  • @JaddarJexiszuir
    @JaddarJexiszuir 5 місяців тому

    In vim, you can just press 'G' to go to the last line.

  • @baraka629
    @baraka629 5 місяців тому +2

    Think this VM approach would also work for isolating kernel-level anticheat tools? I heard people who tried to run some games under Linux had success with a nested VM approach (using intel's Hyper-v)

    • @gordonfreeman9641
      @gordonfreeman9641 5 місяців тому +1

      He specifically said it won't, i tested roblox just for shits n giggles and it still detects it

    • @baraka629
      @baraka629 5 місяців тому +1

      @@gordonfreeman9641 oh right, just got to the part in the video. guess nested VMs it is, then.

    • @EricParker
      @EricParker  5 місяців тому +2

      It's incompatible with 3d acceleration regardless of detection. Our "rootkit" is not useful against another kernel driver.

    • @trimidsmod6391
      @trimidsmod6391 4 місяці тому

      @@EricParker Can't you still install vmware tools and just make that not detected?

  • @FoxyAnimater
    @FoxyAnimater 5 місяців тому +1

    is there a way to do this in qemu-kvm on Linux using Vert-Manager? a lot of us linux users would like to contain the windows malware and increase compatibility with the games we can play(essentially, how do we create an environment to containerize a kernel-level anticheat that(for all intents and purposes) is malware anyway and won't run in Wine/Proton?)

  • @Spootiful
    @Spootiful 4 місяці тому

    VirtualBox and qemu should try to make an abstraction layer for mirroring the hardware your running that VM on, that way it looks like the machine you're using but still running under emulation and harder to detect. Then again, I think qemu still has a problem giving direct access to the GPU in emulation (which is why you need two GPUs for that stuff) so I'm not sure that's happening anytime soon. It would be good for virtualisation and security, however, and something that should be more common even among the average user.

    • @Somethingfs-sx1ft
      @Somethingfs-sx1ft 2 місяці тому +1

      With Nvidia you have vgpu, but you need a license to do that

  • @balsalmalberto8086
    @balsalmalberto8086 5 місяців тому +5

    Next video idea: spoof our main system as a VM so vm aware malware doesn't run on it.

    • @EricParker
      @EricParker  5 місяців тому +2

      cyberscarecrow actually does that. Might make a video on it.

  • @dr_zotiac
    @dr_zotiac 5 місяців тому

    Love this, more tutorials please

  • @Tco-exploiter
    @Tco-exploiter 5 місяців тому +17

    AINT NO WAY THIS WAS 20SECCONDS AGO

    • @Plasticshavings
      @Plasticshavings 5 місяців тому

      it wasn't. youtube delays the shit out of release dates for some reason

  • @kevinwydler7305
    @kevinwydler7305 5 місяців тому +1

    Makes me wonder: Could you modify these things on an everyday system in the opposite way so that malware thinks it‘s a VM even though its not ?

  • @Sumire973
    @Sumire973 5 місяців тому +1

    I wonder, will this work for games with anticheats and DRMs that detect the use of a VM? Because those tend to be the most powerful, widespread, and sophisticated kinds of corporate-sponsored malware.

    • @asunavk69
      @asunavk69 5 місяців тому

      Up to some point, perhaps, like for instance fortnite if u do simpler spoofing, like shown in the video and some other further steps.
      Vanguard(if even possible) would like even need some recompilling(on linux) and really just more advanced stuff just to spoof and go undetected(granted if u cheat, u will speed the probability of things going wrong).

  • @JustAmnesias
    @JustAmnesias 5 місяців тому

    The best thank you ( i really need it )

  • @lennywhere
    @lennywhere 5 місяців тому

    let's all love lain

  • @Cainny
    @Cainny 5 місяців тому +1

    Hey Eric, I know you read these comments, and I have a cool video suggestion.
    You could try testing the 'bad reputation' anti viruses like McAfee, Avast, AVG, etc, against modern malware. People always talk bad about them, but I've never seen them tested. At least not in recent years.
    The PC Security channel does content testing 'Good AVs against modern malware. Why don't you test the bad ones 😁

  • @hallrules
    @hallrules 5 місяців тому +1

    I tried pafish on my main machine and it detected the CPU timestamp thing you were talking about, along with the hypervisor and mouse things lol

  • @mendyc158
    @mendyc158 5 місяців тому +2

    Me: maybe with this I’m gonna be able to play LoL/Valorant on VM inside Linux. Since QEMU doesn’t work
    Video: 4:20 it won’t allow vanguard
    Me: never mind

  • @Kitulous
    @Kitulous 3 місяці тому +1

    couldn't malware detect that we have a SCSI ssd or an AMD engineering sample and therefore find out we're in a VM?

  • @Soup69God
    @Soup69God 5 місяців тому

    Ill have to give this a try. I was using a special virtualbox loader but the devs stopped updating it and eventually removed the repo. 😢

  • @poocyx
    @poocyx 5 місяців тому

    great video eric.

  • @Kalphalus
    @Kalphalus 5 місяців тому +2

    Wait… can I spoof a main pcs mac address and other info to be vm defaults to block some malware from running?

    • @jamesphillips2285
      @jamesphillips2285 5 місяців тому +1

      AFAIK most Drivers let you modify the MAC address. If you set it to a Private MAC address: the malware may assume it is in a VM.

  • @pacsmile
    @pacsmile 5 місяців тому

    4:03 "you're not gonna run riot vanguard on this, but why do you want to"
    it's literally the only reason i want an undetectable vm, to be able to play lol with a linux host lol

  • @jagjyot4828
    @jagjyot4828 5 місяців тому +1

    could you try running something like Vanguard on this VM?

  • @endoxidev
    @endoxidev 5 місяців тому +1

    One question, wondering if triage is undetectable?

  • @gogiy
    @gogiy 3 місяці тому

    It's not like malware developers can't just copy the code of paranoidfish to check for a virtual environment

  • @mintydevil7982
    @mintydevil7982 4 місяці тому

    eric aint pregnant but he delivers.

  • @Meppy0200
    @Meppy0200 5 місяців тому

    It's 3 AM and I don't know why I am here

  • @rodypar317
    @rodypar317 26 днів тому

    Can you share more info or links on the linux kernel hacking thing you were mentioning? Thank you!

  • @MinePossu
    @MinePossu 15 днів тому

    So to make a malware that detects that its in a vm youd just make the malware install a game with vanguard and checks its status.

  • @kritikusi-666
    @kritikusi-666 5 місяців тому

    Interesting. Been trying to figure out how to do this for Pearson Vue. Any tips?

  • @notyoutube8128
    @notyoutube8128 5 місяців тому

    Underrated

  • @POLARTTYRTM
    @POLARTTYRTM 5 місяців тому +1

    Couldn't you use a server version of BSD to set up a virtual environment by companies, shops, hospitals, etc for one machine since they heavily use that for virtualization and most malware runs on these virtual environments without ever knowing it's virtual?

    • @EricParker
      @EricParker  5 місяців тому +1

      Depends hugely on the malware. Linux / IOT malware will run under VMs without complaint, most windows malware will not

    • @POLARTTYRTM
      @POLARTTYRTM 5 місяців тому

      ​@@EricParker I badly worded my reply. I meant they use BSD or Linux for virtualization but many of them use windows VMs to serve as everyday using for their daily activities while having only one computer running the entire company, shop, etc but their hypervisors don't really run these VMs as VMs as far as I know because of the way they are set up, malware just think they are real machines and that's how many malware just go rogue infecting entire networks.

  • @binboupan8076
    @binboupan8076 5 місяців тому

    rdtsc can be passed with a modified kernel

  • @isheamongus811
    @isheamongus811 5 місяців тому

    3:40 if the malware can write forst 512kB of the drive, nothing will help except on BIOS level.

  • @leonniebuhr7193
    @leonniebuhr7193 5 місяців тому +1

    do kernel level anticheats see it as vm?

  • @MrMotoX450
    @MrMotoX450 4 місяці тому

    4:00 "you're not gonna run Riot Vanguard on this but, why do you want to?". Answer: Running Riot games on my M1 Mac via Parallels would be great!

  • @H.N7
    @H.N7 5 місяців тому

    The rdtsc hack doesn't have 100% success chance. Works at first, but eventually it'll start failing.

  • @cruelness55
    @cruelness55 3 місяці тому +2

    Well I tried this tutorial for Roblox (fake exploit analyzing), but it sadly didn't work

  • @Salad_
    @Salad_ 5 місяців тому

    when you showed the vmhardended thing the first thing that came in mind was riot vanguard, do you think there is any way to still get it to work on a vm? i want to switch to linux but i also play riot games often enough that i cant do it yet haha

  • @ITlearner331
    @ITlearner331 Місяць тому +1

    Hi Eric,
    I tried to search everywhere but couldn't find an answer. If I try to install windows 11 I am not able to remove the initially created "nvme" hdd. The remove option is greyed out, I even created a secondary scsi hdd but still no remove option for the nvme. Any tips you can give on how I can proceed would be appreciated.
    Thanks,
    P

    • @powin1277
      @powin1277 18 днів тому

      Did you ever find a solution? Same problem here :P

  • @James2210
    @James2210 5 місяців тому

    to go to the end of file use G and then a

  • @PracticalPcGuide
    @PracticalPcGuide 5 місяців тому +1

    why not changing the CPU ID to something believable other than AMD sample? like having a 5950x and call it i7 4770k with 4c8t assigned or something with equivalent clock speed and c-t?

    • @EricParker
      @EricParker  5 місяців тому +5

      I didn't spoof it period (that is my real CPU). It's a fingerprint for sure, but it's not likely to be blocked.

  • @defacube
    @defacube 5 місяців тому

    Thanks

  • @goldencheats23
    @goldencheats23 5 місяців тому

    Now how to make unsafe windows xp

  • @Jouss3ph
    @Jouss3ph Місяць тому

    Thanks for you helpful video!
    Is there a way to fake cpu temperature, I'm analyzing a malware that detect a VM by the CPU temperature.

  • @oscarvelasquez4236
    @oscarvelasquez4236 Місяць тому

    I cant even figure out how to turn off windows defender antivirus through the registry :D

  • @Anim4000
    @Anim4000 5 місяців тому

    there is similar with KVM? so I can pass through PCIe Card like Network Card, GPU and USB

  • @bruhblox_
    @bruhblox_ 2 місяці тому +1

    More sophisticated software have other ways of detecting a vmware, I guess stuff like this only works for malware not real software because there are many more fingerprints like the BIOS Version, dozens of drivers (which some are crutial to the vm) ect...

  • @Smutsigt-u1v
    @Smutsigt-u1v Місяць тому

    Hello! Could you please make a about what any "mmorpg silkroad online private server" would do to harm a user that is downloading the and run the exe file? I love the game, but 99% of the servers has trojans in them. The admins always say its "false positive", but i highly doubt it. They always say to put the files in a exeption folder in the antivirus/firewall.
    Thanks!

  • @Maske4
    @Maske4 5 місяців тому +1

    What OS do you use in your everyday desktop?

    • @EricParker
      @EricParker  5 місяців тому +4

      Arch

    • @j233wfyw
      @j233wfyw 5 місяців тому +1

      ​@@EricParkergoat 🎉 i love arch and lain

    • @Maske4
      @Maske4 5 місяців тому

      ​@@EricParker 😮😮😮😮😮

  • @jasongonzalez502
    @jasongonzalez502 25 днів тому

    My Disk still say VMware right in front of the new disc name. I don't understand why. I checked through the whole VMX file and there was nothing saying "VMware".

  • @rogercruz1547
    @rogercruz1547 5 місяців тому

    Can I use this to attempt running some games that don't run on linux without having to dual boot?

  • @isheamongus811
    @isheamongus811 5 місяців тому

    Do not infect PCs witj graphox tablet and no mouse. Also not with PS/2 mouse (with exceptions)

  • @scoptimizations
    @scoptimizations 3 місяці тому

    Hmmmm.
    I did everything how you described in the video....
    got trace for pseudo devices; vmmouse.sys, vmhgfs.sys and Reg key.
    Anything which could cause this? Was using MS10Pro 22H2 iso from MS.

  • @troyBORG
    @troyBORG 5 місяців тому

    5:19 that random i at the end didn't cause issues?

  • @FireTigerARG
    @FireTigerARG 4 місяці тому

    What if malware blacklists that HardenedLoader driver ?

  • @baribari1000
    @baribari1000 5 місяців тому

    wow, ty!

  • @ARandomOSDever
    @ARandomOSDever 5 місяців тому

    what if you do this in reverse for extra protection

  • @io1921
    @io1921 5 місяців тому

    Any thoughts on doing this with hyper v?

  • @prohax1
    @prohax1 5 місяців тому +1

    Does this also unlock CPU features?

    • @EricParker
      @EricParker  5 місяців тому +1

      What do you want to unlock?

  • @KlnoOrange
    @KlnoOrange 2 місяці тому +1

    этот гайд уже не рабочий ребят. я тестил на двух ОС - в дисп. устройств ВЕЗДЕ палится виртуалка. тоже самое в реестре. и вишенка на торте - в файла .vmx больше не существует параметра отвечающего за название ССД.

    • @bruhblox_
      @bruhblox_ 2 місяці тому

      it dosent work on win11, maybe thats why idk

  • @bololop1625
    @bololop1625 3 місяці тому

    Error while opening the virtual machine: VMX file is corrupt.
    scsi0.sasWWID = "50 05 05 65 b8 9d c9 70"i

  • @Proferk
    @Proferk 4 місяці тому +1

    whats the point of making such a stealthy vm, when the only thing in your skillset is using wireshark and mitmproxy?