Skip to main content

Questions tagged [virtualization]

Virtualization is the creation of a virtual (rather than actual) version of something, such as an operating system, a server, a storage device or network resources.

0 votes
0 answers
17 views

Issue while building BusyBox for ARM (Cross Compilation) [closed]

I am following this guide (https://medium.com/@denisobrezkov/xen-on-arm-and-qemu-1654f24dea75) to run Xen on Qemu and Arm. Here is the command that I am using to build busybox: make O=$BUILD_DIR/...
Mishaal Ahmed's user avatar
0 votes
1 answer
122 views

Is an isolated VM (Hyper-V) still safe despite the fact that the host uses RDP to view/control the VM?

This question is directed towards creating an isolated environment for a reverse engineering VM, where malicious programs will be disassembled, debugged by executing them, so static and dynamic ...
stringExchange's user avatar
0 votes
1 answer
72 views

Can VirtualBox VM prevent malware infection in my case?

I have installed an exe downloaded from an ad. After a while, my files started to be encrypted gradually, I shut down my PC for days, and reinstalled Windows fresh. After a few days, my PC crashed a ...
Nourdine Dali's user avatar
1 vote
1 answer
321 views

PCR 7 in TPM 2.0 has always the same value

First of all, I must say that I'm using a VM with an emulated TPM 2.0. I've created an LUKS2 encrypted partition and configured the TPM 2.0 to unseal the key only if the PCR 7 has a certain value. For ...
Blasco's user avatar
  • 11
1 vote
3 answers
203 views

Does emulation/software virtualization provide more isolation/security vs hardware virtualization?

From my understanding: I can emulate many different architectures and systems with qemu as a user(mode) process. There is separate user address space per process. If a malicious process were to ...
ift-436t's user avatar
0 votes
0 answers
118 views

What is Virtual Secure Mode trying to achieve?

I recently learned about the feature in Windows 10 called Windows Secure Mode (https://learn.microsoft.com/en-us/virtualization/hyper-v-on-windows/tlfs/vsm). I'm trying to understand what exactly it ...
user2334659's user avatar
0 votes
1 answer
329 views

How to transfer files from a virtual machine to the host without risking getting infected?

I have to transfer some files such as movies, TV series and other large stuff (so I can not to use a cloud) from a virtual machine to the host. I read that an infected virtual machine can spread ...
woyim46107's user avatar
1 vote
2 answers
157 views

Is hardware linked between different operating systems installed in same computer?

I know the safest bet If I want to remain anonymous is having 2 separate computers, but I was curious if having 2 OS in different hard drives (both encrypted) but on same computer the same? Is the ...
Elias LP's user avatar
10 votes
5 answers
7k views

Why is Kali released as a VM?

I have completed a few Bug Bounty tutorials. All of them use Kali Linux installed on VMs. Either VirtualBox or VMWare. Is there a reason why Web App Pen testing would be done from a VM? I'm just ...
Neil Meyer's user avatar
0 votes
1 answer
229 views

How to isolate VMs with internet exposed websites on my home network?

I want to host some websites served from an isolated VM which is on my home network through port forwarding. Although I believe this is reasonably safe, I want to physically segment internet-exposed ...
aughhhhhhh's user avatar
0 votes
0 answers
243 views

Use a virtual machine to do risky stuff. How to stay as safe as possible? [duplicate]

I have a PC with Ubuntu and Windows in dual boot. I use this PC for basic stuff: Windows for gaming, shopping and common browsing, Ubuntu to do something such as home banking. I was thinking to create ...
koxige9113's user avatar
0 votes
0 answers
138 views

How to Safely Research a Suspected Malicious Website by Using A VM [duplicate]

I am aware of a website that I suspect is, at the very least, pulling user data from visitors and possibly performing other malicious activity on visitors. Of course, the safest course of action is to ...
Evan Leahy's user avatar
0 votes
0 answers
67 views

Can guest access host clipboard despite sharing turned off?

Host: Win10 Guest: Linux Software: VirtualBox Clipboard information might not seem important, but it could very well contain a copied password or other useful data. On the host, clipboard history is ...
No Name's user avatar
  • 217
0 votes
0 answers
122 views

What kind of USB-based attacks can be prevented by a VM?

The answer provided to this question by forest has a good summary explaining the types of attacks that a malicious USB can do. Does USB redirection in a VM provide any protection against any of these ...
GuyIncognito's user avatar
0 votes
0 answers
81 views

pfSense not working properly on Azure VNet? What do i do?

I'm currently working on a project based on creating virtual networks and configuring a virtualized firewall (pfSense) along with access control. I was given this project idea in a cybersecurity ...
Thanos's user avatar
  • 111

15 30 50 per page
1
2 3 4 5
34