The reason MalwareBytes on your host machine is able to pick up these network requests is because VirtualBox just re-routes the internet connections from guest to host via NAT bridge. To MalwareBytes on host, it would appear as if VirtualBox is requesting these network connections. However you're still screwed if you have any shared folders that are active while these malware are infecting your computer.
but would the maleware even be able to do anything on the host with those shared folders (other then copying itself into it/infecting files/delting/encrypting files in it?) Without some sort of serious security exploint in windows just having a malious file shouldn't do anything even if it's on a shared folder on the host. Actually infecting the host requires you to go to the shared folter on the host and start in yourself. Of course if windows or virtualbox has some kind of exploit that let's it run automatically your really screwed, but having a shared folder alone shoudn't be enough on it's own either, it needs some kind of exploit.
actually in a technical point of view, you are not, because access to shared folders doesnt mean the host will run these files at all. It would be dangerous only if you had some sort of startup script inside a shared folder, and the virus modified that startup script to get some sort of special acess, but that would require imbearable hacking skills to program a virus that would be smart to do so. most viruses are simple and direct.
@@TechHowYT i think this is fine because the malware cant write to it it can only read that data and any write requests the malware sends should error out, but it is best to have them completely disabled for safety.
downloading virtual machine in a virtual machine in a virtual machine in a virtual machine in a virtual machine in a virtual machine in a virtual machine makes me feel comfortable
CPU and GPU: SIUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU
It's possible for malware to infect the host if there's a bug in the hypervisor or your cpu's virtualisation extensions, howeverthese are very rare and I don't think I've ever seen one before. You're more likely to be infect due to shared folders or havint the networking enabled on the VM
@@lavie69 I've seen a lot of viruses that detect VMs and start acting innocent, or just terminate, but I've never heard of one that nukes the host machine after detecting that it's in a VM. Could you provide an example?
Thank You, you saved my computer. I was going to install vbox and then install windows and then Install a virus but when I watched this video I immediately knew the answer. Thank you
The temp folder CAN hold executables. Especially when using installers, because most time they are unzipping an executable inside them and in order to run them they need a file location so they get dropped into Temp. This can also happen for example when you copy an exe in WinRar, it will copy the exe to the real filesystem into Temp and then copies the path so CTRL+V can put the exe somewhere else
Kinda scary and informative because some of these things are happening on my computer so you may have just informed me of something I had no idea about😅
Hello Lifeen, there is nothing to worry about. While using Vmware, your host cannot get infected. This is due, if you do not share clipboards or folders, or even your network, you will be safe. But it has small chance for infect. So thanks for this video. I am looking forward.
You just have to disable all the features. There are scripts to make it easier. I remember when Enderman got his laptop almost killed as he started a virus on his XP machine and it went through the VMWare outside into his Windows 10 defender screaming.
Even if you turn off all shared stuff. It is possible to break out of the VM and escape the hypervisor (in this case VmBox) and access the host. Tho vmware and co regulary update their software to prevent such expliots. Check out BlackHat for more info.
I mean, it's much harder for a virus to get through a VM than through anti-virus software... I'm no specialist at information security, correct me if i'm wrong, please.
Our teacher at school made us download a linux iso to use within virtualbox. Now the .iso file was infected, starting a virtual machine with the .iso caused it to infect the entire pc and school network. Windows defender noticed but the damage was already done.
@@YourAverageNoobOnRoblox smh no it is not. Clearly you don't know really anything about it. Though yes it might be true that actual hackers prefer Linux because it's way more safe than shitty windows
@@MScienceCat2851 you can program and hack on any OS as long as the tools are there. On Linux though it might be easier to hack as you have full control over literally everything unlike windows. And the fact Linux is way better for concealing that you are a hacker
I am so happy that I watch informative tech videos. This one especially. It taught me some things I didn't know about. So this is how hackers really get your pc to be a part of the botnet. This is really scary and now I will be even more careful than ever.
In case you are REALLY scared, enable isolation on the host and cutoff connections in cooporation with a very good antivirus software But at the end of the day, your best protection is YOU. just dont click on sussy things.
about malwarebytes blocking the "network" thing, it was because for your vm to be able to access internet, it need to go through your computer, through all of your firewall, which one of them is malwarebytes
it depends more on your activities, because you can have shared clipboards and folders, a bridged adapter and still not get infected. But if you are behaving badly, don't be surprised by the outcome ;)
@@user-lj4lo7cx7m I said "it depends MORE", not "exclusively".. before replying to just having the reason, read "unknown user". Of course a piece of software is never flawless, but in general terms, it's quite rare these ones get attacked succesfully
Thank you so much for the video! I was searching about this topic a while ago and today I found your video in my recommendations page. Just what I was searching for. This video + reading the comment section has helped me a lot to understand. Greetings from a teacher :) (Systems&Networking is not my speciality but I use this tools with my students)
Moral of the story: be MEGA carful while testing computer viruses in your vm, be sure that you use a different connection in ur vm and use a Malwarebytes in youre man host pc for protection 😉 Surf safely 😊
If you use virtual box, you can encrypt your internet ip and port. It is like using a separate wifi for your virtual box and your host machine. If you use that opetion i don't think it will spread to the host machine.
@@InfamousKoala if i use a different wifi in guest machine. will not virus escape to that other wifi"s connected device (other than host machine)? pls reply.
POV: you have 128GB ram and you run a virtual machine inside a virtual machine inside a virtual machine inside a virtual machine inside a virtual machine inside a virtual machine inside a virtual machine inside a virtual machine inside a virtual machine inside a virtual machine inside a virtual machine inside a virtual machine inside a virtual machine inside a virtual machine inside a virtual machine inside a virtual machine inside a virtual machine inside a virtual machine inside a virtual machine inside a virtual machine inside a virtual machine inside a virtual machine inside a virtual machine inside
Very scary! Bravo to you good sir for being the testbed for our enjoyment! I think I’ll leave the virtual virus testing to more advanced folks…… for now lol
This is one of my favourite videos to watch, I don’t know what it’s called but these kind of creepy viruses and Trojan’s website videos are so interesting. Amazing video 👍🏻
The correct answer to this is it depends. But if a hypervisor 0day is present then the answer is yes a skilled and aware malware dev can escape the vm. Other methods can be shared directories as mentioned. Vuln software on your host machine if they vm is not on an isolated network. But also if you have a shared clipboard via methods like clipboard hijacking files.
Thank you so much bro I wanted to download steamunlocked games but as soon as I saw this video I was like just get the game with real money. We can appriciate that this guy took risk of his own pc for us Thank you once again 😊
@@lifeen Hey, is it possible that you explain a bit more. I'm new to this, so I don't know anything What is sandboxie? How to download cracked software without any viruses? Do you know best websites for that?
But I always download from steam unlocked u see there are two steam unlocked website one with ads and might be fake and the other one has no ads anyway I downloaded games from steam unlocked and it has no virus
Actually the user account control is either saying its a verified publisher or a unknown publisher (most malware are unknown) asking administrator access and giving an option to say yes or no which you likely have if you own the pc
15:54 delete all the stuff from temp. i heard that if your PC is slow, after closing all apps out, delete all files in Temp, as that is where some temporary files used in other apps are located
I havent watched the whole video, but i feel 100% sure already that the answer is yes, even though it would be hard as it would essentially require a sandbox escape from the VM.
I recall being remotely controlled by someone on the Internet, I was a silly kid that downloaded Munecraft forceop hacks and portforwarded to get my Minecraft server on the Internet
around 9:50 when your host's Malwarebytes sends you an alert for blocked web traffic, I'm assuming this is simply because the Virtual Machine is piggybacking off of the host's network? And essentially there is nothing to worry about, it's just the network traffic inside the virtual machine being detected which does not affect the host? Only curious if you agree, I am a novice with this stuff.
@@lifeen i have SEP (Symantec Endpoint Protection) and i always wondered why am i getting pop-ups from antivirus when i am going to sites on VM. But now i know why 🙃
Nicely stated, PSY0PZ. The VM (or hypervisor) is just another process making requests and receiving responses which have to pass through the host's security protections. Of equal concern is that when requests leave the VM (without going through a VPN) - your actual IP Address (of your router) is now known. This will invite unwanted attention from BOTS looking for open ports or port forwarding weaknesses (RDP, etc., ) on your infrastructure.
@@d4sty. I fix it by running a VPN inside my VM. This allows me to use the VPN's servers to reach sites that I'm interested in connecting to with a different IP address and if required a different region. Your ISP will still see your IP address (of your router) and the VPN provider will too but the data you're sending and receiving is encrypted (within the VPN's tunnel). Your host (the physical computer running the VM) will not be able to unencrypt the data which means any anti-malware or anti-virus software running on the host will not be triggered.
You are likely not isolating your network adapter and your VM traffic is being passed through your PC and then out to your router-modem-internet. MBAM is picking it up once it makes it to your PC.
Tip for this delete files in temp folder like delete the temp folder its for like when u turn on ur pc for first time and u need to set it up but if it gets factory reseted then it will reinstall
Bruh, once malicious website downloaded viruses in my computer, but it downloaded antivirus too. Viruses were neutralised after restart. They were just opening random websites
@Lifeen wow. With NAT, it is still possible to spread to host machine ! Can you please recommend me a malware family which works in VM environment, performs network activity but not spread on host machine ? Is it possible ? I want to capture the network traffic of this infected machine.
Virtualbox has a few convenience features like shared clipboard and drag and dropping files. You can set it to off, from only guest to host, from only host to guest, and bidirectional. Are these potential attack vectors for malware to exploit? If i keep it set to host to guest only or off would it be safer? I rarely need to ever pull anything _out_ of the guest system anyways. Usually only ever use such features to drop files _into_ the guest that I need, such as executables for example.
1:46 if you got malwarbytes installed and working, then you've got it. those crack sites either give you malware or the real deal, next to never is the real thing packaged with malware. so no dont uninstall malwarebytes if you finished the installation
Virus has to be coded in c++ ask request to connect direct hardware access instead of virtual. You can damage hardware to touch host software you need to know communication between virtual box to host machine os handle the request from virtual machine then. You can able to achieve possible it's really hard person should know os level programming and really good understanding of network
So now I know why Mint virtual machines have little issue with shared folders, while Mac virtual machines are a nightmare to enable. Mint has very few viruses. Even Macs are more virus-prone!
I'll be back with more vidz. I know its 2 years later, am still studying. I've noted your requests. My personal repo: github.com/NixonSchool
hello
hi
incredible
yeaaa
hi
The reason MalwareBytes on your host machine is able to pick up these network requests is because VirtualBox just re-routes the internet connections from guest to host via NAT bridge. To MalwareBytes on host, it would appear as if VirtualBox is requesting these network connections. However you're still screwed if you have any shared folders that are active while these malware are infecting your computer.
but would the maleware even be able to do anything on the host with those shared folders (other then copying itself into it/infecting files/delting/encrypting files in it?) Without some sort of serious security exploint in windows just having a malious file shouldn't do anything even if it's on a shared folder on the host. Actually infecting the host requires you to go to the shared folter on the host and start in yourself. Of course if windows or virtualbox has some kind of exploit that let's it run automatically your really screwed, but having a shared folder alone shoudn't be enough on it's own either, it needs some kind of exploit.
actually in a technical point of view, you are not, because access to shared folders doesnt mean the host will run these files at all.
It would be dangerous only if you had some sort of startup script inside a shared folder, and the virus modified that startup script to get some sort of special acess, but that would require imbearable hacking skills to program a virus that would be smart to do so.
most viruses are simple and direct.
What if we are using something like Kasam to virtualize does it do the same ?
What if you have the shared folders set to read only within Virtual Box?
@@TechHowYT i think this is fine because the malware cant write to it it can only read that data and any write requests the malware sends should error out, but it is best to have them completely disabled for safety.
downloading virtual machine in a virtual machine in a virtual machine in a virtual machine in a virtual machine in a virtual machine in a virtual machine makes me feel comfortable
😇😁
CPU and GPU fans be like uuuuuuuuuuiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii
lmao 😂
@@akgamer3666 poor GPU bruh
CPU and GPU: SIUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU
I have never seen a text-to-speech youtuber with such great grammar!
Very informational video :)
💀
It's possible for malware to infect the host if there's a bug in the hypervisor or your cpu's virtualisation extensions, howeverthese are very rare and I don't think I've ever seen one before.
You're more likely to be infect due to shared folders or havint the networking enabled on the VM
What if we are using something like Kasam
Some viruses detects the vm and nukes the host
@@lavie69 how would that happen?
@@dwlive732 What is kasam?
@@lavie69 I've seen a lot of viruses that detect VMs and start acting innocent, or just terminate, but I've never heard of one that nukes the host machine after detecting that it's in a VM. Could you provide an example?
Thank You, you saved my computer. I was going to install vbox and then install windows and then Install a virus but when I watched this video I immediately knew the answer. Thank you
The temp folder CAN hold executables. Especially when using installers, because most time they are unzipping an executable inside them and in order to run them they need a file location so they get dropped into Temp. This can also happen for example when you copy an exe in WinRar, it will copy the exe to the real filesystem into Temp and then copies the path so CTRL+V can put the exe somewhere else
OHHHHHHHHHHH
dude i was so scared when i saw executables in my temo folder, thanks!
Kinda scary and informative because some of these things are happening on my computer so you may have just informed me of something I had no idea about😅
Stop downloading porn torrents in your virtual box
@@enacku lmao
@@enacku "but the shady guy on quora with no source said it was okay!!!"
@@enacku No.
@@enacku No, i don’t think i will
Hello Lifeen, there is nothing to worry about. While using Vmware, your host cannot get infected. This is due, if you do not share clipboards or folders, or even your network, you will be safe. But it has small chance for infect. So thanks for this video. I am looking forward.
You just have to disable all the features. There are scripts to make it easier. I remember when Enderman got his laptop almost killed as he started a virus on his XP machine and it went through the VMWare outside into his Windows 10 defender screaming.
@@jonny11bonk 😁
@@jonny11bonk do you have the link to video?
Even if you turn off all shared stuff. It is possible to break out of the VM and escape the hypervisor (in this case VmBox) and access the host. Tho vmware and co regulary update their software to prevent such expliots. Check out BlackHat for more info.
@@TheFimiTube Yeah, plus there are private exploits. However, if you get infected just send the virus to VMWARE and report it.
If you get a advanced piece of malware that can go from virtual machine to host machine malware bytes isn't going to save you.
i think you're underestimating malwarebytes.
@@leothesaviourhe certainly is
I mean, it's much harder for a virus to get through a VM than through anti-virus software... I'm no specialist at information security, correct me if i'm wrong, please.
Isn't virtual machine, aside from ricing some KDE distro or Arch within Windows, the type of "anti-virus" for when you KNOW a file is a virus?
Our teacher at school made us download a linux iso to use within virtualbox. Now the .iso file was infected, starting a virtual machine with the .iso caused it to infect the entire pc and school network. Windows defender noticed but the damage was already done.
bro linux is already a hacking operating system
@@YourAverageNoobOnRoblox smh no it is not. Clearly you don't know really anything about it. Though yes it might be true that actual hackers prefer Linux because it's way more safe than shitty windows
@@aleksandersats9577 ..and simple programmers a lot of the time, lol
@@aleksandersats9577 I thought hackers and programmers use linux brcause they have more control since its open source?
@@MScienceCat2851 you can program and hack on any OS as long as the tools are there. On Linux though it might be easier to hack as you have full control over literally everything unlike windows. And the fact Linux is way better for concealing that you are a hacker
I am so happy that I watch informative tech videos. This one especially. It taught me some things I didn't know about. So this is how hackers really get your pc to be a part of the botnet. This is really scary and now I will be even more careful than ever.
In case you are REALLY scared, enable isolation on the host and cutoff connections in cooporation with a very good antivirus software
But at the end of the day, your best protection is YOU.
just dont click on sussy things.
haha yes
But what about the horny MILFs in my area?
@@wafflesncatsup5323 eat some catnip then idk
@@wafflesncatsup5323 wait wtf
@@tylern6420 meoww
about malwarebytes blocking the "network" thing, it was because for your vm to be able to access internet, it need to go through your computer, through all of your firewall, which one of them is malwarebytes
it depends more on your activities, because you can have shared clipboards and folders, a bridged adapter and still not get infected. But if you are behaving badly, don't be surprised by the outcome ;)
Not really, there have been vulnerabilities with VirtualBox and VMware that can execute code from the guest machine to the host one
@@user-lj4lo7cx7m I said "it depends MORE", not "exclusively".. before replying to just having the reason, read "unknown user". Of course a piece of software is never flawless, but in general terms, it's quite rare these ones get attacked succesfully
@@whateverdope after you :)
bro talks like my spam folder :((((
goes much deeper than videos on this topic, very interesting
easy fix: open a virtual machine in a virtual machine in a virtual machine. that why you will protect your computer a protection no hack able
@@lifeen or use an ENTIRE DIFFERENT operating system for the host
@@Jack_ekrjgterbtonr good idea
I do that lmao, or i use my old laptop tha has nothing bout me, and diff wifi
A relaxing game of trucking with hobby of trying out malware, what a chad
The quickest way for it to get through is having a share folder on the host (shows up as a drive in the vm) it can speedrun
Thank you so much for the video! I was searching about this topic a while ago and today I found your video in my recommendations page. Just what I was searching for. This video + reading the comment section has helped me a lot to understand. Greetings from a teacher :) (Systems&Networking is not my speciality but I use this tools with my students)
Moral of the story: be MEGA carful while testing computer viruses in your vm, be sure that you use a different connection in ur vm and use a Malwarebytes in youre man host pc for protection 😉
Surf safely 😊
Yes, some malware such as ransomware can encrypt the main computer's files without file sharing set to none on a virtual machine
so the ransomware accesses the actual hardware disk?
@@alone-vf4vy, Yes. Only if file sharing is not set to none, ransomware can encrypt your main PC drive files
If you use virtual box, you can encrypt your internet ip and port. It is like using a separate wifi for your virtual box and your host machine. If you use that opetion i don't think it will spread to the host machine.
How give me step by step instructions 😁 please.
@@sydrul8756 when you lauch your vm there is gonna be a newtork tab in the settings. There you can use different netowrk for your inbuilt vm
What do people here mean by shared files can spread malware to host?
@@Tomas-ml9nv if you share files from an infected pc, it might be shared as well
@@InfamousKoala if i use a different wifi in guest machine. will not virus escape to that other wifi"s connected device (other than host machine)? pls reply.
3:37 you can just press win+r to open run box and type appdata and enter then click local and temp (also open show hidden items)
a quicker way with the run box is to type %temp% into it.
@@SmilerRyanYT Oh yeah I forgot that
POV: you have 128GB ram and you run a virtual machine inside a virtual machine inside a virtual machine inside a virtual machine inside a virtual machine inside a virtual machine inside a virtual machine inside a virtual machine inside a virtual machine inside a virtual machine inside a virtual machine inside a virtual machine inside a virtual machine inside a virtual machine inside a virtual machine inside a virtual machine inside a virtual machine inside a virtual machine inside a virtual machine inside a virtual machine inside a virtual machine inside a virtual machine inside a virtual machine inside
The crack background is amazing. Anyways you helped me with the cracked apps.
These type of videos are very interesting
Thank you for risking ur machine for this video
You tell many times you cant see whats going on... And my brain just screams: TASK MANAGER
Very scary! Bravo to you good sir for being the testbed for our enjoyment! I think I’ll leave the virtual virus testing to more advanced folks…… for now lol
This is one of my favourite videos to watch, I don’t know what it’s called but these kind of creepy viruses and Trojan’s website videos are so interesting. Amazing video 👍🏻
The loquendo, the Pc vibe, the virus theme. I just love it. It's so creepy and nostalgic at the same time. Damn.
@@jyj-6414 honestly yeah, its all round just creepy with all of the malware having happy icons, it gives me goosebumps
Thanks sir, for so nice n so useful programs you are giving us God Almighty bless you n your family
underrated channel
The correct answer to this is it depends. But if a hypervisor 0day is present then the answer is yes a skilled and aware malware dev can escape the vm. Other methods can be shared directories as mentioned. Vuln software on your host machine if they vm is not on an isolated network. But also if you have a shared clipboard via methods like clipboard hijacking files.
Is there a safe way to just turn off the VBox VM wifi while running the "virus"? Trying to test some files out
I know this is an unnecessary tip, but you can press down your middle mouse button on a link in your browser to open a new tab with the website.
My 18 yr old sis was so scared for this to happend, he has almost no virtual machine experience
@@bloodbonnieking lmao
@@bloodbonnieking what virtual machine does to a mf
Thank you so much bro I wanted to download steamunlocked games but as soon as I saw this video I was like just get the game with real money. We can appriciate that this guy took risk of his own pc for us Thank you once again 😊
@@lifeen Hey, is it possible that you explain a bit more.
I'm new to this, so I don't know anything
What is sandboxie?
How to download cracked software without any viruses?
Do you know best websites for that?
commenting for notifs
@@lifeen 🙏🙏🙏appreciate you for this man
@@lifeen you never made it
But I always download from steam unlocked u see there are two steam unlocked website one with ads and might be fake and the other one has no ads anyway I downloaded games from steam unlocked and it has no virus
Guess what? If you give your VM network access, it can use the network to attempt to spread computer worms! Wow, who would've thought?
how do we transfer the files then, log into dropbox or something?
@@maxxseemount an iso file that contains the files you need to put
Won't the virus just infect other users on the network the host is in?
just turn off your internet when u run the virus
@@lifeen turn off your hosts wifi
first off if network sharing is on then yes maybe, otherwise no.
Pull out your Ethernet cable on your host machine first.
idk maybe vpn
music is very much needed on this content 🍿 love it
Actually the user account control is either saying its a verified publisher or a unknown publisher (most malware are unknown) asking administrator access and giving an option to say yes or no which you likely have if you own the pc
15:54 delete all the stuff from temp. i heard that if your PC is slow, after closing all apps out, delete all files in Temp, as that is where some temporary files used in other apps are located
@@gh2286what
then delete as many as you can without crashing it, as viruses can be lurking therer
@@gh2286 use it while your not rinning windows. if its temporary it should be able to remake itself
very informative ! I'll watch my back and try software on a VM now :) (I did when I was suspicous but you know ; never trust computers)
So, i left this video playing, and when I came back, this dude was just reading wikipedia? Great content, bro
i feel like this is an ad for malwarebytes lmao
It is entirely possible for that happen, but it would have to be a very smart exploit to make that happen.
at another time still I appreciate all this information
I havent watched the whole video, but i feel 100% sure already that the answer is yes, even though it would be hard as it would essentially require a sandbox escape from the VM.
A hypervisor Exploit can be exploited to infect the host machine
I recall being remotely controlled by someone on the Internet, I was a silly kid that downloaded Munecraft forceop hacks and portforwarded to get my Minecraft server on the Internet
around 9:50 when your host's Malwarebytes sends you an alert for blocked web traffic, I'm assuming this is simply because the Virtual Machine is piggybacking off of the host's network? And essentially there is nothing to worry about, it's just the network traffic inside the virtual machine being detected which does not affect the host? Only curious if you agree, I am a novice with this stuff.
@@lifeen i have SEP (Symantec Endpoint Protection) and i always wondered why am i getting pop-ups from antivirus when i am going to sites on VM. But now i know why 🙃
Nicely stated, PSY0PZ. The VM (or hypervisor) is just another process making requests and receiving responses which have to pass through the host's security protections. Of equal concern is that when requests leave the VM (without going through a VPN) - your actual IP Address (of your router) is now known. This will invite unwanted attention from BOTS looking for open ports or port forwarding weaknesses (RDP, etc., ) on your infrastructure.
@@laughingalien and how to fix that?
@@d4sty. I fix it by running a VPN inside my VM. This allows me to use the VPN's servers to reach sites that I'm interested in connecting to with a different IP address and if required a different region.
Your ISP will still see your IP address (of your router) and the VPN provider will too but the data you're sending and receiving is encrypted (within the VPN's tunnel). Your host (the physical computer running the VM) will not be able to unencrypt the data which means any anti-malware or anti-virus software running on the host will not be triggered.
@@laughingalienare free vpns fine too? And which one are you using if I may ask? Thanks in advance
You are likely not isolating your network adapter and your VM traffic is being passed through your PC and then out to your router-modem-internet. MBAM is picking it up once it makes it to your PC.
Tip for this delete files in temp folder like delete the temp folder its for like when u turn on ur pc for first time and u need to set it up but if it gets factory reseted then it will reinstall
i really apreciate your help with dowloanding this software
Bitdefender plus malwarebytes plus kaspersky = god trio
Bruh, once malicious website downloaded viruses in my computer, but it downloaded antivirus too. Viruses were neutralised after restart. They were just opening random websites
I asked this every time I was seeing a video of trying viruses in a virtual machine
bro where chalk up u been, it is so cool
for some reason the text to speak voice sounds like that one analog horror voice sometimes in the video
Great video and very useful. Hope you could monetize it!
Pretty educational. I love it.
Thank You Very Much I Really Plan On Being An Upcoming Producer??
More please! Hope you get to 1k subs!
Bro got nfs most wanted on his pc hes a legend
Some almost facts, like the yellow banner meaning ”not safe to install” and not “not signed by paying Microsoft a bunch of money”
This video wass much longer than it shoul've been.
Does your virtualbox have the network adapter configured as NAT or bridge?
thank you so much man i learned a lot in this video
the fork video downloader
question would less severe viruses be tolerated and not be carried to the host?
It's been a wild ride.
me watching without the audio and thinking when the virus is going to break the host machine
@Lifeen wow. With NAT, it is still possible to spread to host machine !
Can you please recommend me a malware family which works in VM environment, performs network activity but not spread on host machine ?
Is it possible ?
I want to capture the network traffic of this infected machine.
btw to not get infected, Turn off network adpater, erase clipboard, VM Wifi then it will have 1% of spreading into host PC
way less than 1%.
They won't delete the malware after this, there are countless videos about CNET and they hadn't deleted anything.
yes it can, it is called a virtual machine bypass or something i forgot
underated youtuber looking forward to more
now run a virtual machine in a virtual machine
Virtualbox has a few convenience features like shared clipboard and drag and dropping files. You can set it to off, from only guest to host, from only host to guest, and bidirectional. Are these potential attack vectors for malware to exploit? If i keep it set to host to guest only or off would it be safer? I rarely need to ever pull anything _out_ of the guest system anyways. Usually only ever use such features to drop files _into_ the guest that I need, such as executables for example.
, during the second wave..
Very good video, though Id like to see you voiceover/speak live instead of doing TTS, it would be more comfortable to watch
1:46 if you got malwarbytes installed and working, then you've got it. those crack sites either give you malware or the real deal, next to never is the real thing packaged with malware. so no dont uninstall malwarebytes if you finished the installation
Thank god i downloads virus with my internet adaptor disconnected
Downloading usually isn't an issue. Running it though. That's where the problem begins
how do you use the internet then if your host wifi is off?
@@ln7594 you can still run malware without host wifi
Virus has to be coded in c++ ask request to connect direct hardware access instead of virtual. You can damage hardware to touch host software you need to know communication between virtual box to host machine os handle the request from virtual machine then. You can able to achieve possible it's really hard person should know os level programming and really good understanding of network
No
i love how u explain everything, likes for u 👍
What is the overall conclusion of this video?? Can the virus spread on the host machine?
People's been saying that virus protection has been killing people's computer Even my best friend said that and he's smart
man. Thank you!
someone of them are probably arent running cus its a vm as some are built to detect if its a vm
this feel like a whole movie lmao
So now I know why Mint virtual machines have little issue with shared folders, while Mac virtual machines are a nightmare to enable. Mint has very few viruses. Even Macs are more virus-prone!
i feel like my computer is boutta get that virus lol
for each track/instrunt?
At some point I think it dose because original file store in host pc
Personal opinion:
This TTS makes me want to rip my ears off and throw them into the ocean.
that was a nice video it definitely helped out, thankyou so much and you just earned a sub
What if the virus was working and you just turn of the internet. Won't it stop the virus?
Iv'e been wondering if that also would happened if a virtual machine was in a virtual machine and so on and so on
That's why i hate " cracks".
just watched this entire vid haha, i love it