Question about Virtual Machines w/o network access

Discussion in 'sandboxing & virtualization' started by aluminex, Jun 4, 2012.

Thread Status:
Not open for further replies.
  1. aluminex

    aluminex Registered Member

    Joined:
    Oct 13, 2009
    Posts:
    143
    I was wondering how vulnerable are virtual machines that are in a "host-only" setup? The host os can communicate to the guest os.

    Are these systems susceptible to certain attacks? Do unpatched host systems in this configuration pose the same threat as an unpatched guest os?
     
  2. Victek

    Victek Registered Member

    Joined:
    Nov 30, 2007
    Posts:
    6,219
    Location:
    USA
    Good question. I don't know if anyone has done extensive analysis of this. The most obvious thing to do is turn off sharing between the guest and host. I use Virtualbox and as a matter of convenience it is possible to share folders between the two in order to move files back and forth. If you really need to isolate the guest, for instance if you're using it to run malware and test security apps, then this "sharing" is dangerous.

    As to "patching" it makes sense to fully patch both the guest and host. Why would you leave either unpatched? No doubt there are undiscovered attack vectors. There are folks here that do use VMs to test malware - they would be the best ones to ask for more info.
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.