StackZero
  • Homepage
  • Cryptography and Privacy
  • Ethical Hacking
  • Reverse Engineering
  • Contacts
  • About Me
No Result
View All Result
StackZero
No Result
View All Result

How to Install FlareVM on VirtualBox (Step-by-Step Tutorial)

July 5, 2022
in Reverse Engineering
0 0
How to Install FlareVM on VirtualBox (Step-by-Step Tutorial)
0
SHARES
6.8k
VIEWS
Share on FacebookShare on Twitter

In this tutorial, we are going to install FlareVM; a freely available and open-sourced Windows-based security distribution designed for:

  • Reverse engineers
  • Malware analysts
  • Incident responders
  • Penetration testers.

Even if no one prevents us to install it into our main system, the usual way to set up our lab is to install it on a Virtual Machine (Windows 7+ with at least 60GB of hard drive and 2GB RAM) so that malware cannot damage the system (Here is the guide on how to install Virtualbox).

Since this blog aims to be resolutely practical I strongly suggest you have this ready-to-use VM that can be both a malware analysis and exploit development lab.

Get the files

Without wasting any more time, we can get straight to the point and install FlareVM.

Keeping in mind that the entire process can require a lot (it depends on your connection speed), let’s start:

The first step is going to the official repository at https://github.com/mandiant/flare-vm from your guest machine, click ‘Code’, and select ‘Download Zip’. (You can also clone the repository with git if you already have it in your VM).

flarevm repository

After that, you will have a zipped folder among your downloads, so extract its content by right-clicking and “Extract all”:

At this point you should see the following screen, just click on “Extract”.

extract flarevm

Optionally you can move the entire folder into a more comfortable place like directly under “C:\”.

Running the script

Among the files in the repository, there is a script named “install”, it will do the whole work for us, so let’s see how we can launch it.

Now we have found it, we need to copy the full path of the install script as the image below is showing.

copy path

Once we have done everything, the next step is to go to the Start button, search for ‘Windows Powershell’ and select ‘Run as administrator’.

search powershell

Once Powershell is working, type ‘cd’ and paste the copied path, and hit Enter!! It changes the current working directory into the one of FlareVM.

flarevm cd

Now, type ‘Set-ExecutionPolicy unrestricted’ and hit Enter.
The system will ask you for confirmation for changing the execution policy, so type ‘Y’ and hit enter.

It’s time to run the script, so type “.\install.ps1” (only bold part, no quotation marks) and hit Enter.
At this point, it will ask again for confirmation if you want to run the untrusted script, you just need to press the “R” key and Enter.

After that click ‘Y’ when it asks for confirmation to continue if disk space is less than 40GB.

running script

The installation process will start automatically. It may take 1 – 3 hours for installation.

The final result

When the process of FlareVM installation is complete you can notice some differences:

  • The Desktop Wallpaper is changed with the FlareVM’s Logo
  • The desktop has a folder named “FLARE” which contains almost all the free tools you are going to use in your cybersecurity career.

Tags: install flarevmmalware analysismalware analysis labpentesting labvirtual machinewindows virtual machine
Previous Post

How to install Kali Linux on VirtualBox in a few minutes

Next Post

SQL Injection: What You Need to Know

Next Post
SQL Injection: What You Need to Know

SQL Injection: What You Need to Know

You might also like

Cryptographic functions

Cryptographic Hash Functions in Python: Secure Your Data Easily

November 3, 2024
Malware Obfuscation Techniques: All That You Need To Know

Malware Obfuscation Techniques: All That You Need To Know

March 25, 2024
How To Do Process Enumeration: An Alternative Way

How To Do Process Enumeration: An Alternative Way

March 4, 2024
How To Do DLL Injection: An In-Depth Cybersecurity Example

How To Do DLL Injection: An In-Depth Cybersecurity Example

February 8, 2024
Process Injection By Example: The Complete Guide

Process Injection By Example: The Complete Guide

January 24, 2024
How To Build Your Own: Python String Analysis for Malware Insights

How To Build Your Own: Python String Analysis for Malware Insights

November 10, 2023

StackZero

StackZero is a specialized technical blog dedicated to the realm of cybersecurity. It primarily provides insightful articles and comprehensive tutorials designed to educate readers on developing security tools. The blog encompasses a broad spectrum of subjects, starting from the foundational principles of cryptography and extending to more sophisticated areas such as exploitation and reverse engineering. This makes StackZero an invaluable resource for both beginners and professionals in the field of cybersecurity.
The blog covers a wide range of topics, from the basics of cryptography to the more advanced topics of exploitation and reverse engineering.

Tags

application security blind sqli blind sql injection bruteforce c cesar cipher command injection cryptography ctf cybersecurity debugging dom-based xss dvwa ethical-hacking ethical hacking exploitation file inclusion gdb hacking injection javascript malware malware analysis malware evasion network-security pentesting lab picoctf pico ctf python reflected xss reverse engineering sql sqli sql injection static analysis stored xss substitution substitution cipher vulnerable application web application security web exploitation web security windows windows api xss
  • About Me
  • Contacts
  • HomePage
  • Opt-out preferences
  • Privacy Policy
  • Terms and Conditions

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}
No Result
View All Result
  • Homepage
  • Cryptography and Privacy
  • Ethical Hacking
  • Reverse Engineering
  • Contacts
  • About Me