CAPE SANDBOX OPEN-SOURCE SOFTWARE FOR AUTOMATED MALWARE ANALYSIS ON LINUX-BASED OPERATING SYSTEMS

Authors

DOI:

https://doi.org/10.32782/forensic.science.2025.1.13

Keywords:

malware analysis using open source software, malware analysis tool for Linux, Cape Sandbox, Cuckoo counterpart for malware research

Abstract

The article briefly presents an overview of the functionality of the Cape Sandbox software, which allows you to study the behavior of malicious software in an isolated environment under Microsoft Windows XP/7/10/11 and Ubuntu 32/64-bit operating systems using a Linux kernel-based operating system as a host in an automated mode.

References

1. Cape Sandbox Book Copyright 2010–2015, Cuckoo Foundation, 2016–2024, kevoreilly. Revision 4c1af810. URL: https://capev2.readthedocs.io/en/latest (дата звернення: 13.12.2022).

2. Rebaker501, Instruction for getting CAPEv2 Malware Sandbox up and running URL: https://github.com/rebaker501/capev2install (дата звернення: 12.12.2022).

3. Yan Sandman, Deploying CAPEv2 on AWS – A Comprehensive Guide URL: https://y4nush.com/posts/installation-of-capev2-sandbox-on-aws/ (дата звернення: 12.12.2022).

Published

2025-01-15

How to Cite

Zaks, O. (2025). CAPE SANDBOX OPEN-SOURCE SOFTWARE FOR AUTOMATED MALWARE ANALYSIS ON LINUX-BASED OPERATING SYSTEMS. Forensic Science, (1), 98–101. https://doi.org/10.32782/forensic.science.2025.1.13

Issue

Section

Статті