38
How to validate a large torrented file is clean?
(lemmy.dbzer0.com)
1. Posts must be related to the discussion of digital piracy
2. Don't request invites, trade, sell, or self-promote
3. Don't request or link to specific pirated titles, including DMs
4. Don't submit low-quality posts, be entitled, or harass others
📜 c/Piracy Wiki (Community Edition):
FUCK ADOBE!
Torrenting/P2P:
Gaming:
💰 Please help cover server costs.
![]() |
![]() |
---|---|
Ko-fi | Liberapay |
Hey thank you for the info. Which VM do you use? How do you disable the various types of sharing with the host? Also, how do you validate? Sorry for all the questions, but that seems like it may be my only option
I use Hyper-V because I run server 2022 and it's free. Hyper-V allows you to disable any host resource sharing in the VM settings.
On my sandbox VM I'll scan the files then install and scan, then run the software and scan. I use both defender and I think malwarebytes. It's a lot of extra work for no gain, but I'd rather be too careful than risk installing malware.
Note that sophisticated malware [attempts to] identify whether it is running in a VM / testbed / analysis scenario and may behave and look different between that runtime scenario and "normal use".
Analysis in a VM may not be sufficient to determine whether it is safe outside of it.
If it detects that it is in a VM and doesn't activate the malware, then I'm perfectly okay just using the software inside the VM.
Thank you for the detailed response. Just to confirm, is Hyper-V your sandbox VM? I used ESET to scan the files I torrented, but they look very suspicious from virustotal, but I don't really know how to parse the info - knowing if it is a false positive/etc.
Hyper-V is the hypervisor that the VM runs on. Yeah I don't really know which malware scanners are the go to ones anymore. Just figure if I can get it to pass through 2 different ones ok then it's probably ok. I'm sure there's some other good ones out there. I've heard of ESET and virustotal, but I'm not familiar.
Do you know of any guides to set up Hyper-V for this type of purpose? I want it to be as secure as can be: "disable any type of sharing with the host, no copy paste, no sharing disks, etc."