A linux VM uses FDE, so to use it you have to type a passphrase at boot time.
Furthermore, a usb keyboard is connected directly to the VM so it does not appear in the hardware list of the host.
If the host gets owned, ie a hacker somehow manages to break into the host, how can they break into the above VM?
Hello,
When your host gets compromised all bets are off.
Aka yes if your guest is running then it can be broken into if the host is compromised.
--
Wil
Doesn't anybody have specifics how the hacker would do it in the above setup?
If I give you the root password to a public free VPS that I will have setup with vmware installed and a linux VM running in the VPS, how many here will manage to break into the VM described in the OP question?
UlyssesOfEpirus wrote:
Doesn't anybody have specifics how the hacker would do it in the above setup?
If I give you the root password to a public free VPS that I will have setup with vmware installed and a linux VM running in the VPS, how many here will manage to break into the VM described in the OP question?
Would it suffice to produce a crash dump that could be examined by the Linux 'crash' utility? Create a snapshot of the VM and feed the snapshot into vmss2core.