By Niren Shah
Let's say that, in your forensics adventure, you have an executable that you know is committing the crime :). Obviously, you want to investigate further by executing it and understanding all the changes that it does. This let's us understand the behavior in depth. But you can't (or at least shouldn't) run that on your main workstation. You could create a VM and use that to run the application -- at least that keeps the changes isolated to that VM and you can take snapshots and rollback to your hearts content.
While this is not a bad strategy and managing the VM snapshots and rollbacks isn't that much of an hassle, you're still left with the monitoring and figuring out what on earth changed while the executable was doing its nefarious deeds. There's a better way. Introducing Sandboxie.
Sandboxie falls into the "sandbox" category of applications. In the security context, a sandbox is a mechanism that isolates application so that they can be restricted from doing bad things to real systems. Sandboxie does exactly that:
You can read all about it here and there are plenty of help topics here to help you get started. But the concept is super simple. Once you've installed it on your system, you:
Here's what we want to do:
Here's how you do it:
Go ahead and have fun! You can safely run applications that are malicious or suspicious and then explore all the changes that were made by the application. It is a great way to hone your forensics skills. Enjoy :)