You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
91 lines
1.2 KiB
91 lines
1.2 KiB
3 years ago
|
= LabInstance peframe!
|
||
|
|
||
|
|
||
|
== Quickstart
|
||
|
|
||
|
This is a quickstart guide of howto use this *LabInstance*
|
||
|
|
||
|
=== Default Configuration
|
||
|
|
||
|
- Working Directory
|
||
|
|
||
|
> /home/docker/project
|
||
|
|
||
|
- Default user
|
||
|
|
||
|
> docker
|
||
|
|
||
|
- Default password
|
||
|
|
||
|
> docker
|
||
|
|
||
|
- Default password4root
|
||
|
|
||
|
> pass
|
||
|
|
||
|
|
||
|
== LabInstance Info
|
||
|
|
||
|
peframe is a open source tool to perform static analysis on Portable Executable malware and generic suspicious file. It can help malware researchers to detect packer, xor, digital signature, mutex, anti debug, anti virtual machine, suspicious sections and functions, macro and much more information about the suspicious files.
|
||
|
|
||
|
|
||
|
|
||
|
== More info
|
||
|
|
||
|
https://github.com/guelfoweb/peframe[^]
|
||
|
|
||
|
|
||
|
== RUN INSTANCE
|
||
|
|
||
|
Swarmlab services can be run in different ways.
|
||
|
|
||
|
- You can run them **through the swarmlab hybrid environment** (http://docs.swarmlab.io/SwarmLab-HowTos/swarmlab/docs/swarmlab/docs/hybrid/start-microservices.html)
|
||
|
- or use them individually at will on the **command line of your system**
|
||
|
|
||
|
|
||
|
=== CLI
|
||
|
|
||
|
> git clone ...
|
||
|
|
||
|
> cd [DIRECTORY]
|
||
|
|
||
|
|
||
|
=== help
|
||
|
|
||
|
> make help
|
||
|
|
||
|
|
||
|
==== create service
|
||
|
|
||
|
> make create
|
||
|
|
||
|
|
||
|
=== start service
|
||
|
|
||
|
> make start
|
||
|
|
||
|
|
||
|
=== stop service
|
||
|
|
||
|
> make stop
|
||
|
|
||
|
|
||
|
=== list service
|
||
|
|
||
|
> make list
|
||
|
|
||
|
|
||
|
=== clean service
|
||
|
|
||
|
> make clean
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
|