jayc71 wrote: » That tool doesn't seem to actually attack any vulnerability in the hypervisor itself, it just allows for a brute force or MitM attack against a connection to the ESX host. That's a known avenue of attack, and the best practice to avoid such an attack is to isolate the management traffic vLAN so that it's ACL'd and not globally accessible. VMware acknowledges that such attacks are possible, it's actually not preventable from the host-side and has nothing to do with virtualization, it's more of a standard security issue. Just seems a bit sensationalist to me... sure, ESX runs a stripped down linux console, if you can attack that directly you can potentially access the hosted VMs. In short, secure your environment!