0

I’m looking for answers specific to VMware Workstation Pro 17.5.2. in 2024, not answers about other VM softwares.

On Windows 11, how can I harden a VM in VMware Workstation Pro 17.5.2 so that malware doesn’t escape and infect the host during malware analysis?

Which boxes in the settings of VMware must I check or uncheck to make the VM as safe as possible?

Which extra software do I need to create a safe unescapable VM environment? Is REMnux for example necessary in this regard? If yes, are there alternatives that work better than REMnux?

Tried to search for answers on Youtube, but found only tutorials for VirtualBox and old versions of VMware.

11
  • We have quite a lot of posts on here on this very question.
    – schroeder
    Commented Jun 10 at 13:05
  • The link answers are still relevant for your question
    – schroeder
    Commented Jun 10 at 13:10
  • I tried to check if there were answers to my question, but could not find any specific to VMware Workstation Pro 17.5.2. in 2024.
    – ingenting
    Commented Jun 10 at 13:11
  • Of course not. However, all of the ideas concepts and general settings still apply in your case. As well as all the risks. There is no magic "can't get hacked" checkbox.
    – schroeder
    Commented Jun 10 at 13:13
  • I’m totally new to malware analysis, so will help a lot if someone can please point me to a tutorial for beginners. Many YT videos show how to install and what to check or uncheck in a VM. So should there not be a similar check list specific to hardening a VM in VMware Workstation Pro 17?
    – ingenting
    Commented Jun 10 at 13:17

0

Browse other questions tagged .