Virtual Machines:Os exploitations.

The ubiquitous operating system, discussion of its (many) flaws, and how to mitigate the risks of those flaws

Virtual Machines:Os exploitations.

Post by Mr_Grey on Fri Jul 16, 2010 7:54 pm
([msg=41931]see Virtual Machines:Os exploitations.[/msg])

Working on a theory in the usage and defense of Virtual Machines. It seems that since a virtual OS is isolated from the original computer, people have been using it to make a simple "Disposable" OS. Writing a virus to this type of setup is moot, due to the os simply being destroyed upon logout, and then remade whenever they wish it so.
The question is, has anyone found potential exploits to subvert the virtual OS and attack the original, so as to avoid the shield.
This is not a question as to the application of the virus, but to find potential holes within the usage so they may be blocked, I find it to be a nice challenge to look around to eh?

Whats your thoughts? Figured a way around it? Gimme your opinion.
Mr_Grey
New User
New User
 
Posts: 38
Joined: Sun Jun 13, 2010 10:16 pm
Location: Kentucky
Blog: View Blog (0)


Re: Virtual Machines:Os exploitations.

Post by fashizzlepop on Fri Jul 16, 2010 8:44 pm
([msg=41935]see Re: Virtual Machines:Os exploitations.[/msg])

I figure it's definitely possible, but it would be very tricky. I would guess that you would need to find a flaw in the virtualization software. Ie. VirtualBox or vmplayer.

The problem is it would only be specific to those running virtually which is a very small percentage of private use.
The glass is neither half-full nor half-empty; it's merely twice as big as it needs to be.
User avatar
fashizzlepop
Developer
Developer
 
Posts: 2303
Joined: Sat May 24, 2008 1:20 pm
Blog: View Blog (0)


Re: Virtual Machines:Os exploitations.

Post by thetan on Fri Jul 16, 2010 10:30 pm
([msg=41948]see Re: Virtual Machines:Os exploitations.[/msg])

The hypervisor takes on the role of the super user. Find an exploit in the hypervisor and instead of being the super for 1 machine, you're basically god for X number of virtual machines.

Hardware virtualization technology has been taken advantage of by root kits and malware too, http://en.wikipedia.org/wiki/Blue_Pill_(malware)
"If art interprets our dreams, the computer executes them in the guise of programs!" - SICP

Image

“If at first, the idea is not absurd, then there is no hope for it” - Albert Einstein
User avatar
thetan
Contributor
Contributor
 
Posts: 657
Joined: Thu Dec 17, 2009 6:58 pm
Location: Various Bay Area Cities, California
Blog: View Blog (0)



Return to Microsoft Windows

Who is online

Users browsing this forum: No registered users and 0 guests