Can someone explan about bootloader for ESXi 4.1?
Does it use GRUB? Does it use an MD5 encrypted password?
ESXi uses syslinux/isolinux - not Grub
syslinux then chainloads mboot.c32/safeboot.c32 which then loads the kernel
Hi gvenkatsumanth ,
Have you follwed this link.If not please follow this link. http://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=102399...
@ jimraina
what does a comparison of ESX and ESXi has to do with tis question ?
I asked this earlier but did not get a response:
Does ESXi 4.1 boot-loader use an MD5 encrypted password?
Thanks.
the bootorder is syslinux > mboot32 > ESXi kernel
the first two dont use passwords so I dont think the bootloader uses md5 ...
maybe I missunderstand your question ...
I see you have several questions guiding in one direction.
Do you need to proove that an ESXi cant be exploited if some has local access or something like that ?
>>> Do you need to prove that ESXi can't be exploited if someone has local access?
Exactly.
Appreciating your responses.
Hm - that will be tricky if not impossible.
If you allow someone to change the boot-medium you also open the door for using ESXi from other media than the local disk.
Personally I use a ESXi LiveCD that boots a fully functional ESXi from a CD - using a USB-stick is another way to do that.
So when I need to read VMFS I can do it by several different approaches.
Only option to prevent me from reading the VMFS or manipulating the local ESXi system you must lock the BIOS