This was not highlighted in the video, but it's important to emphasize what technically occurred here in order to really appreciate why this is cool. We recorded the execution of a full Windows OS and then extracted all of the processes on the system as well as information about the dynamically loaded modules. We did this without deploying any code in the target Windows OS, meaning that all of the information was derived by interpreting the state of the guest system based on it's hardware. So the analysis was performed "outside-the-box".
Hi, i'm at 9:38. panda-system-i386 starts a vnc server although i've done the same steps and commands you did. How do i get a gui in order interact with the emulated system as you have? Thank you
This was not highlighted in the video, but it's important to emphasize what technically occurred here in order to really appreciate why this is cool. We recorded the execution of a full Windows OS and then extracted all of the processes on the system as well as information about the dynamically loaded modules. We did this without deploying any code in the target Windows OS, meaning that all of the information was derived by interpreting the state of the guest system based on it's hardware. So the analysis was performed "outside-the-box".
nice video, i hope we can see more advanced use cases too. i think a video about taint/tracer would be intersting!
Hi, i'm at 9:38. panda-system-i386 starts a vnc server although i've done the same steps and commands you did. How do i get a gui in order interact with the emulated system as you have? Thank you
Ok, i've connected to the vnc server via xtightvncviewer. What is the gui you are using and that pops up automatically as seen in your video?
Thank you for the informative video.
Awesome video. Thanks
I got "No bootable device" when I try to run panda-re on ubuntu20.04, would you help me out?