Book now with code EOY2025
HeroPsycho wrote: » A guest OS is not completely isolated from the Host OS.
carboncopy wrote: » So analyzing malware on a VM is not completely safe I would assume. That is if the host os is vulnerable to what is being analyzed on the vm. Is there a way to make the Guest OS completely isolated from the Host OS?
knwminus wrote: » It would be possible for a host to get a virus from a guest if a shared file was infected and executed against one or the other. What I mean is if I am downloading stuff from limewire in the guest to a location that is mapped on the host (like a data share) and the items were infected, it is possible for both the host and the guest to get infected (correct?).
JDMurray wrote: » If you will be doing possibly damgerous things with your VMs, like connecting to potentially malicious Web sites, it should be done on a separate machine running virtualization software that uses a minimal host OS (VMware ESXi) that has little chance of being infected by VM-aware Malware. The machine should also have an Internet connection that is separate from your LAN. If you absolutely need the VM to be running on your desktop machine using software like VMware Player or Fusion, use sand boxing software (like SandBoxie) on the VM, do not create shares to the VM's guest OS, and revert to a clean snapshot when done. Depending on your LAN hardware, there are also a number of ways to isolate the VM's traffic from your LAN's traffic using VLANs or a VPN connection to your Internet gateway. Does anyone know of a good book or blog that contains extensive details about sandboxing VMs from surrounding OSes and networks?
JDMurray wrote: » Does anyone know of a good book or blog that contains extensive details about sandboxing VMs from surrounding OSes and networks?
Use code EOY2025 to receive $250 off your 2025 certification boot camp!