zxtnt09

VM disable executable

8 posts in this topic

Hi again guys,

how can i disable executable my program in "VMware ,Virtual PC ,Sandboxie ,VirtualBox" ?

it's meant , i don't like my script run in "Virtual machines"

thanks for your supporting :wub:

Share this post


Link to post
Share on other sites



Does it matter where your script runs? Why would you want to disable running it on a VM?


My UDFs and Tutorials:

Spoiler

UDFs:
Active Directory (NEW 2017-04-18 - Version 1.4.8.0) - Download - General Help & Support - Example Scripts - Wiki
OutlookEX (NEW 2017-02-27 - Version 1.3.1.0) - Download - General Help & Support - Example Scripts - Wiki
ExcelChart (2015-04-01 - Version 0.4.0.0) - Download - General Help & Support - Example Scripts
Excel - Example Scripts - Wiki
Word - Wiki
PowerPoint (2015-06-06 - Version 0.0.5.0) - Download - General Help & Support

Tutorials:
ADO - Wiki

 

Share this post


Link to post
Share on other sites
Just now, water said:

Does it matter where your script runs? Why would you want to disable running it on a VM?

i searching and know that if your script don't run in VM , your script is safer and Exe2Aut Can not decompile that :sweating:

Share this post


Link to post
Share on other sites
Just now, zxtnt09 said:

i searching and know that if your script don't run in VM , your script is safer and Exe2Aut Can not decompile that :sweating:

Yo're wrong.

Your AutoIt compiled script can be decompiled and deobfuscated to look exactly how you wrote it, there is absolutely nothing you can do about that.

Nothing.

1 person likes this

AutoIt Absolute Beginners    Require a serial    Pause Script    Video Tutorials by Morthawt   ipify 

Monkey's are, like, natures humans.

Share this post


Link to post
Share on other sites

#5 ·  Posted (edited)

As I posted in the other thread you can't save your script from being decompiled. You can only make it harder to read.
VM or not VM does not matter.

Edited by water
1 person likes this

My UDFs and Tutorials:

Spoiler

UDFs:
Active Directory (NEW 2017-04-18 - Version 1.4.8.0) - Download - General Help & Support - Example Scripts - Wiki
OutlookEX (NEW 2017-02-27 - Version 1.3.1.0) - Download - General Help & Support - Example Scripts - Wiki
ExcelChart (2015-04-01 - Version 0.4.0.0) - Download - General Help & Support - Example Scripts
Excel - Example Scripts - Wiki
Word - Wiki
PowerPoint (2015-06-06 - Version 0.0.5.0) - Download - General Help & Support

Tutorials:
ADO - Wiki

 

Share this post


Link to post
Share on other sites

:'(  now i have two problems "Exe2Aut" and "deobfuscated" ,

now i have a big question , is "jos" and "jon" have this problem too ? 

i actually mean this problem is for anyone or it's just for me ? ( cus i'm noob ? )

Share this post


Link to post
Share on other sites

No, it is a general "problem". But not only with AutoIt but with all scripting languages.
Search the forum for "protect script" and you will find a lot of discussions regarding this subject.
https://www.autoitscript.com/forum/search/?&q=protect%20script&search_in=titles

1 person likes this

My UDFs and Tutorials:

Spoiler

UDFs:
Active Directory (NEW 2017-04-18 - Version 1.4.8.0) - Download - General Help & Support - Example Scripts - Wiki
OutlookEX (NEW 2017-02-27 - Version 1.3.1.0) - Download - General Help & Support - Example Scripts - Wiki
ExcelChart (2015-04-01 - Version 0.4.0.0) - Download - General Help & Support - Example Scripts
Excel - Example Scripts - Wiki
Word - Wiki
PowerPoint (2015-06-06 - Version 0.0.5.0) - Download - General Help & Support

Tutorials:
ADO - Wiki

 

Share this post


Link to post
Share on other sites

Even if the code was secure (depending on the degree) and difficult to decompile, there are still debuggers.  

VMs are a good way to debug, test, analyze and reverse engineer software--malware for example--and control risk.  Now-a-days malware has been designed to try and avoid execution by detecting if it is running in a VM.  

While an interesting safeguard (for the coder), there are both perks for and against this tactic.  One, people who are really trying to reverse engineer the code will analyze their hearts out and take what measures they need to get the job done (or at least best effort).  Second, most VM checks are not very robust and easily spoofed which renders some malware useless.  

I guess my point is bottom line, there is nothing i am aware of that is intrinsic about executing code in a VM within itself that makes the code more protected.  

1 person likes this

Share this post


Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!


Register a new account

Sign in

Already have an account? Sign in here.


Sign In Now