-
Can someone tell me how ISBoxer works technically? How detectable is ISBoxer by the client?
I'm not talking about how to use it... I can always wiki the guide. I'm talking about what the client sees... what is the client's perspective of ISBoxer? Does it know it's being sandboxed? How does it interpret this? Does it think it's in a new computer or VM? Does it know that the keys are being cloned? I'm curious on the amount of detection possible by the client on knowing it's being run under ISBoxer.
Posting Rules
- You may not post new threads
- You may not post replies
- You may not post attachments
- You may not edit your posts
-
Forum Rules
Connect With Us