Can Malware escape Virtual Machines?

แชร์
ฝัง
  • เผยแพร่เมื่อ 7 ต.ค. 2024
  • Can Malware escape Virtual Machines?
    Official Discord Server - / discord
    Learn Reverse Engineering - skool.com/eric...
    Follow me on X - / atericparker
    Disclaimer: The content in this video is for education and entertainment purposes to showcase the dangers of malware & malicious software. I do not encourage any form of illegal hacking, nor do I encourage the usage of game cheats, cracks or hacks.
    Cracks are sometimes shown to highlight the dangers of software piracy, my content is not intended to teach anybody how to pirate, or maliciously hack.
    (C) Eric Parker 2024

ความคิดเห็น • 198

  • @justwatching6118
    @justwatching6118 วันที่ผ่านมา +163

    But can worms escape from my PC's to power cable, then from power cable dig the way out and get inside me while I sleep?

    • @gideon5942
      @gideon5942 วันที่ผ่านมา +11

      🤨🤨🤨🤨

    • @Tathanic
      @Tathanic วันที่ผ่านมา

      Yesish but no?

    • @vengefulone6282
      @vengefulone6282 วันที่ผ่านมา

      Idiot, they will got stuck by electricity

    • @KappaKappa-oi1kp
      @KappaKappa-oi1kp 23 ชั่วโมงที่ผ่านมา +24

      Not if you eat your vegetables. Have you been eating your vegetables?😐

    • @jemagif78
      @jemagif78 19 ชั่วโมงที่ผ่านมา +3

      yes

  • @the-answer-is-42
    @the-answer-is-42 วันที่ผ่านมา +469

    I remember Mutahar (someordinarygamers) mentioning in a video that he had to reimage his PC because he was doing a virus investigation and it managed to escape the VM. So yeah, it's absolutely possible. It's why I'm too scared to do it myself and instead watch TH-camrs take the risk.
    I still think VMs are a good security measure, but as all security measures, don't assume it's a silver bullet because nothing is completely secure... Except TempleOS.

    • @plu-official
      @plu-official วันที่ผ่านมา +47

      templeos the goat

    • @sakamocat
      @sakamocat วันที่ผ่านมา +85

      templeos is the most secure OS because it is secured by the lord himself... amen

    • @speedymemes8127
      @speedymemes8127 วันที่ผ่านมา

      Best solution for testing is to have a dedicated box on its own subnet/vlan that cannot communicate with the rest of your network.
      Even then, when you actually test you definitely should unplug Ethernet and setup a fakenet or something similar to look for network connections.

    • @raininafrica4620
      @raininafrica4620 วันที่ผ่านมา +61

      @@sakamocat and if it ever gets hacked then it was god's plan all along

    • @tablettablete186
      @tablettablete186 วันที่ผ่านมา +2

      ​@@raininafrica4620No way, LMAO

  • @SIMULATAN
    @SIMULATAN วันที่ผ่านมา +51

    Love how humble you are, explaining these things without a big ego

  • @blacklamb8393
    @blacklamb8393 วันที่ผ่านมา +151

    Wouldn't happen in TempleOS

    • @ObtainEmployment
      @ObtainEmployment วันที่ผ่านมา +1

      In the temple, viruses glow in the dark

    • @balsalmalberto8086
      @balsalmalberto8086 วันที่ผ่านมา +13

      Malware on TempleOS would download more ram and a car for us.

    • @johndeaux8815
      @johndeaux8815 วันที่ผ่านมา +14

      If you get a virus on TempleOS you might summon a D(a)emon

    • @HelloworldXY32
      @HelloworldXY32 18 ชั่วโมงที่ผ่านมา

      God is the anti-virus, he checks the malware for us before it runs

    • @doodmcswood507
      @doodmcswood507 16 ชั่วโมงที่ผ่านมา +3

      Daemons cannot tread upon holy ground

  • @superbtrilogy5049
    @superbtrilogy5049 วันที่ผ่านมา +55

    Can malware go through a brick wall next please.

    • @KappaKappa-oi1kp
      @KappaKappa-oi1kp 23 ชั่วโมงที่ผ่านมา

      No need to go through brick walls.
      t̵͍͈͝ḧ̶̢̟̪͕́ë̷̡͚́̓̇͋͝y̶͇̠̗̬͛̏̐͆̓ ̸̡͗̿l̴̳͍̓̽͌͆̌ì̷̢̬͚͜ͅv̷̬̘̼̱͐̓͑́͝ͅe̸͇͚̪̱̅̎̊̓ ̸͙̾̾̍̀͝i̵̡͍͂̍̊͝n̸̢̡̢͍̥̓ͅs̴̤͓̈́͌̊̚ȋ̴͕̻͔̟͐͊̓̚d̸̫̫̻͖̐͗̄͐͝e̶̠͔͊̐́̚ ̷̩͚̹̈́̽̏̿̏̈́ÿ̶̢̜̗̱̩́̑͆̈́͋o̷̤͇͓̲̿̇̀͘ǘ̵͔̼̳͙͓̥̐͝r̶̪̞̅̉̐͝ ̷͈̥̠̱̐̅̊̆͌̌w̶̨̲̗͎͛̋̅̌͆̑ͅa̴̛̯͉̍͆̆̐l̸̛͓̯͕͑̌̄ͅl̷̛̙͖̪̼̾̐̐̈́ͅs̴̯͕̞͖̩̖̀̍͝͝͝
      ṯ̸̨̛̘̥̈́̇͘͠h̵̛͈͍̰͙̑̎̒͝e̵̩̻͓̠͇̐͂͂͝y̸̛̪̟͇̟̞͑̽́̕ ̷̜̟̂̌̆͛͌ͅc̶̻̱̞͚͋̒̐̐͑͜a̴̤͉̍̈́͂̄̚ǹ̵̡̈́̆̽ ̷̛̠̦͙̗̽̓͛̕h̴̢̢̼̬̓͊͌̆̚é̶̪͇̰͚̠̀͘̚a̸̜͎̦̲̩̋̓̎̔r̶̛̪̫͎̱̖̅̓͠ ̶͍͉̫̀͂̊̎ȳ̸̡̛͕͔͍̯̋̕̚õ̷̫̪͆̒̀̑ư̵͇͕̈́̆̑̕ȓ̷̡̛̛͕͔̯̊̐ ̴͖̯̘̗̇̓͆͘͝h̵̢͖̹̥̘̀̄̓̇͝e̷̬̖̙̋̿͌̀͘á̶̛̼̻̯̟̪͛͗̾r̵̢̫̻̯͛̿̎̾͘t̵͉͉͎̀̀̎̐͝ͅb̷̝̫̦̦̋͆͌̕e̶̠̝̯̍̐̋̆͂a̷̱̫͓͑̅̿̄t̷̹̑͆͊̊̑ ̸̡͉̝̙̿̐̎̕͠a̸̛͖͖͛̓̽̕n̷͈̤̮̐͂̍̇͝ͅd̶̫̪̗͍̫͋̔̎̕͘ ̷̡̘͍͓̑̑̑̊͝f̵̱͚͚͌͌͋̕a̴̪͕̹͇̋͑̾̎ṟ̶̢̲͍͊́͌̑t̶̨͓̑͗͂́̚ͅs̸̟̞̼̠͒̀̈́͝ ̷͔͕͉̳̅̑̒̄ͅw̵̹̲̦̗͆̀̋̆́h̸̡̟̠͎́̀̔̿̚e̷̢͕͓̽̽̍̏ͅn̷̠̞̲̈́̋̀̔̕ ̷̰̋͐̇͝ỹ̷͖͔͇͎́̏̇͒ͅö̴͕̝͖̯̳́̈́͋́ǘ̶̱͇̖͉̟̅̓͒̕ ̵̢͍͚̘̃͊̾͂s̴̝̱͚̻̦̓̆̏̋ḻ̸̨̼͉̯̍̀͝͝e̷̢̢̖̗͑̆͋̚ę̵̩̟̠͑̍̐̿̔p̴̢̛̲͕̖͖̎͛̕͝

  • @YoRorenn
    @YoRorenn วันที่ผ่านมา +346

    yes, they can.

    • @sebastianandres
      @sebastianandres วันที่ผ่านมา +50

      thanks you helped me get my 9 minutes back from this video

    • @H3llfire320
      @H3llfire320 วันที่ผ่านมา

      ​@sebastianandres my guy, search it up

    • @neztimar43
      @neztimar43 วันที่ผ่านมา +33

      ​@@sebastianandreshe also says this 28 seconds onto the video, so yeah.

    • @x1hax
      @x1hax วันที่ผ่านมา +11

      But it is not that simple

    • @sebastianandres
      @sebastianandres วันที่ผ่านมา +4

      @@neztimar43 i lied to you i didnt even saw the video man

  • @HafizurRahman-vh7hw
    @HafizurRahman-vh7hw วันที่ผ่านมา +100

    Can Malware escape Virtual Machine running inside a Virtual Machine which is running inside a Virtual Machine?

    • @TomJakobW
      @TomJakobW วันที่ผ่านมา +25

      yes.

    • @corporalcorgi4948
      @corporalcorgi4948 วันที่ผ่านมา +21

      If it can escape one machine, then what is another machine for it to escape out of?

    • @thatoneglitchpokemon
      @thatoneglitchpokemon 23 ชั่วโมงที่ผ่านมา +3

      yes just the malware could just clone itself to the hypervisor and if it gets detected as a VM redo the process until the VM detection returns false

    • @JohnSmith-gd2ws
      @JohnSmith-gd2ws 22 ชั่วโมงที่ผ่านมา

      ​@@thatoneglitchpokemon(TL;DR at bottom)
      That's assuming a lot. For one that either the same hypervisor is being used or that the exploit works for any hypervisor. Well as that that the computer can be detected as a VM in the first place and it's for example not like just a KVM Windows VM faking real hardware and has all possible security maximized (Proper Group Policy setup, UAC, none bruteforceable password, minimal version of Windows such as the IoT release (legal evaluation version can be legally used here), limited and minimized network capabilities, fully deleting any and all browsers including Edge and EdgeWebView, firewall enforced by the VM above it and so on...) And or the same being done with a more well equipped OS for this such as OpenBSD
      TL;DR work with the principle of least privilage (such as minimal OS install with only what it needs), and use different hypervisors and OSes per layer of virtualization. And if possible use QubesOS for a more secured and streamlined process. The chances of virtualization fully being defeated even on an internetless fully locked down OS such as a properly configured OpenBSD in the middle of the VM chain is astronomically low, hackers have a higher chance of getting through waiting for a cosmic ray to flip enough bits to hack it for them. Or that they figure out a surefire undefatable way to hack all CPUs to their core.

    • @amentco8445
      @amentco8445 21 ชั่วโมงที่ผ่านมา +1

      ​@@thatoneglitchpokemonhow difficult would this be if every vm is a different OS?

  • @fluf201playz
    @fluf201playz วันที่ผ่านมา +51

    Interesting video, but I'm curious about the specific vulnerabilities they exploited to escape the virtual machine. Were these known exploits that were patched or were they zero-day vulnerabilities?

    • @EricParker
      @EricParker  วันที่ผ่านมา +33

      I don't think there has ever been a case of a malicious exploit. All of the ones I showed are from pwn2own or other trade shows.

    • @tirushone6446
      @tirushone6446 วันที่ผ่านมา +3

      @@EricParker well that's the thing, an actual hacker or malware dev isn't going to be concered with exploiting the computer of a security researcher using a vm, because that's such a small number of people it isn't worth the dev time to actually acheive. so the fact these are hobbiest hackers doing it for fun makes sence to me.

  • @leggysoft
    @leggysoft 23 ชั่วโมงที่ผ่านมา +5

    VM escapes are one of the top-tier warchest 0-days since you can steal many huge servers with one for a massive attack, or steal data from the adjacent VMs stealthily.

  • @Silvreina
    @Silvreina วันที่ผ่านมา +6

    all fun and games until it escapes into ANOTHER vm but doesnt realise it

  • @S.S.S759
    @S.S.S759 วันที่ผ่านมา +27

    I love the "Not that windows defender will detect anything".

    • @alfonzo7822
      @alfonzo7822 9 ชั่วโมงที่ผ่านมา

      But... It's the only solution you need.

    • @S.S.S759
      @S.S.S759 9 ชั่วโมงที่ผ่านมา

      @@alfonzo7822 Yes, and no. Depends on how u are using your pc. If u are careful the it's ok, but you know still bad. So getting a better av is a good idea.

  • @dadarkmatterdude
    @dadarkmatterdude วันที่ผ่านมา +10

    Honestly not that long ago i thought a VM is a panacea when testing malware and other malicious stuff.

    • @bruhblox_
      @bruhblox_ วันที่ผ่านมา +5

      its never safe to download something period, if its a vm a malware could break out of it, if its a throwaway pc networms could reach your main pc through the network

    • @robert7100
      @robert7100 วันที่ผ่านมา

      @@bruhblox_ just buy internet from different internet providers for each PC

  • @LeetHaxington
    @LeetHaxington 20 ชั่วโมงที่ผ่านมา +6

    The can TH-camrs put the answer in the title situation is insane

  • @magnumsoe
    @magnumsoe 21 ชั่วโมงที่ผ่านมา +4

    how did we came from carving rocks in the cave to this specific malware issue man...

  • @fluf201playz
    @fluf201playz วันที่ผ่านมา +18

    short answer yes long answer Y E S

    • @goldencheats23
      @goldencheats23 วันที่ผ่านมา

      What if you have a antivirus on the main system? Does it just bypass it? @Eric Parker

    • @AdilKettani-n3b
      @AdilKettani-n3b 17 ชั่วโมงที่ผ่านมา

      ​@@goldencheats23 If it can break out of vms its probably ud too

    • @goldencheats23
      @goldencheats23 17 ชั่วโมงที่ผ่านมา

      @@AdilKettani-n3b so the antivirus won't do anything once it gets into the main system? How does that work

  • @volcanic_sloth
    @volcanic_sloth วันที่ผ่านมา +97

    but can malware escape physical machines?

    • @SmilerRyanYT
      @SmilerRyanYT วันที่ผ่านมา +50

      Only other thing past physical is via network/wireless/bluetooth etc, to try spreading to another physical.

    • @VINgaming1113
      @VINgaming1113 วันที่ผ่านมา +24

      Some malware can infect the wifi and other pcs connected to the WiFi

    • @Chicken12Salad
      @Chicken12Salad วันที่ผ่านมา +2

      @@SmilerRyanYT shut off your internet as soon as you know youve got a virus

    • @Tf2snipergaming
      @Tf2snipergaming วันที่ผ่านมา +3

      Yes, they can affect all machines on a network

    • @EricParker
      @EricParker  วันที่ผ่านมา +62

      net worms can. This is why firewalls are important.

  • @jcxtra
    @jcxtra วันที่ผ่านมา +2

    Ahh, good old operator error. Running a sample not in the specialised isolated section, but on the host. That's why they say never experiment if you're not prepared to lose everything. =^.^=

  • @fluf201playz
    @fluf201playz วันที่ผ่านมา +19

    This video was really intreasting. I wonder if there's a way to completely prevent malware from escaping virtual machines, or if it's always going to be a cat-and-mouse game.

    • @LukasGaz.444
      @LukasGaz.444 วันที่ผ่านมา +2

      intreasting 😭😭 but yeah its probably always gonna be a cat and mouse game, because they is always vulnerabilities in programs, so people are always going to find a way to exploit this. but maybe in theory there will be a day that vms will have like an unstoppable firewall that prevents all malware from seeping through.

    • @westbrook0853
      @westbrook0853 วันที่ผ่านมา +3

      Well, I think instead
      of focusing on the VM, we should focus on the host and perhaps create a special lockdown mode or ‘high alert mode’ when testing malware on a VM

    • @tablettablete186
      @tablettablete186 วันที่ผ่านมา +3

      There is no way to prevent all escapes

    • @apache937
      @apache937 วันที่ผ่านมา +3

      unnetworked and a host with nothing worthwhile on it is a good start

    • @samuels1123
      @samuels1123 วันที่ผ่านมา +5

      Full virtualization is an entirely impractical yet successful answer.
      Malware can reach a host if it is installed on an imaginary operating system directly connected to the host hardware.
      Malware cannot reach the host if it is installed on imaginary computer hardware in a simulated computer.

  • @ShivanshGupta51
    @ShivanshGupta51 วันที่ผ่านมา +3

    Love the way you explain man ❤❤

  • @emmioglukant
    @emmioglukant 20 ชั่วโมงที่ผ่านมา +3

    I've heard that some malware get "permanently" embedded in hard storage, staying there despite reformatting the disk

    • @Kreze202
      @Kreze202 19 ชั่วโมงที่ผ่านมา +6

      Iirc it's not embedded in the storage, but rather the firmware/CPU(?) somehow? I could be remembering wrong, but it's true that there are malwares that persist even through a disk reformat

    • @capulini
      @capulini 13 ชั่วโมงที่ผ่านมา +1

      Malware on bios

    • @frankbucciantini388
      @frankbucciantini388 7 ชั่วโมงที่ผ่านมา

      Not really, once you format a disk everything is gone. The problem is that they infect the UEFI which means that they're gonna live in your motherboard memory, so regardless of how many times you format your HDD, the virus will keep reinfecting it.

    • @HafizurRahman-vh7hw
      @HafizurRahman-vh7hw 6 ชั่วโมงที่ผ่านมา

      @@frankbucciantini388 what's the solution in that case?

  • @tabs8231
    @tabs8231 วันที่ผ่านมา +2

    But can malware escape my basement?

  • @vladislavkaras491
    @vladislavkaras491 19 ชั่วโมงที่ผ่านมา

    Thanks for making my sleeping even more nervous! :D
    And thanks for the video!

  • @UnknownDerpyPro
    @UnknownDerpyPro วันที่ผ่านมา +1

    Matrix level threat, still trying to escape reality

  • @honkSchumacher
    @honkSchumacher วันที่ผ่านมา +4

    What I do is I bought a cheap old intel Nuc off ebay for 50 usd and run a linux based hypervisor on it. I then run windows in that to mess with windows malware. I believe it is highly unlikely that a malware that targets windows will attack my linux host. Additionally I do have that machine on an entirely physically separate network. No vlan or subnetting or anything. Literally no physical connection. I use one of those old 3g data sticks on it to connect it to the internet.
    That tiny little box is generally my testing environment for all sorts of things that i don‘t want on my actual machine.

  • @F_Around_and_find_out
    @F_Around_and_find_out วันที่ผ่านมา

    Some malwares are smart: can recognize a VM and so it won’t fire so naturally you think it’s safe. And when it’s in the real system it fires. Maybe not a VM escape but a VM dodging.

  • @Typocat
    @Typocat วันที่ผ่านมา +1

    I am too afraid of somehow messing up my host computer so instead i just mess around in triage

  • @kaerix0
    @kaerix0 8 ชั่วโมงที่ผ่านมา +1

    We're still waiting for the cat ears at 100k bro... 😼

  • @kuil
    @kuil วันที่ผ่านมา +1

    Can they escape a virtual machine running inside of another, running inside of templeOS?

  • @Tricvy
    @Tricvy วันที่ผ่านมา +2

    What about remote desktops?
    Sorry if that's a dumb question I do not have much knowledge on these subjects.

    • @art0007i
      @art0007i วันที่ผ่านมา

      Well a remote desktop is basically like you're watching a video so it's quite unlikely to have an escape.
      But if your remote desktop supports drag and drop files from the remote desktop to the normal desktop or other similar interaction features it's maybe possible that they could be exploitable. But if you don't have any fancy features, so basically you can just look and click then there is no way to have an exploit

    • @wchodala9263
      @wchodala9263 วันที่ผ่านมา +1

      Yes, malware can spread via remote desktop protocol. You should not ever make rdp with untrusted entities as it can compromise not only your PC but whole network you are connected to. Your PC can serve as pivot point to attack all other devices at same network

    • @Alexander-dc4kf
      @Alexander-dc4kf 6 ชั่วโมงที่ผ่านมา

      @@wchodala9263 that would only work if you had unauthenticated rdp on your host and that was visible to the untrusted machine... a client to a server (untrusted machine) would be safe.

  • @nexipg
    @nexipg วันที่ผ่านมา +3

    Can Malware escape RDP?

    • @EricParker
      @EricParker  วันที่ผ่านมา +4

      That's actually an interesting question. In theory it's possible such an exploit exists, haven't reversed RDP much.

    • @Skyeithink
      @Skyeithink 11 ชั่วโมงที่ผ่านมา

      RDP to newer versions of windows have drag and drop file transfer enbaled by default so id imagine it would be pretty easy

  • @truemorpheus
    @truemorpheus 3 ชั่วโมงที่ผ่านมา

    You forgot to talk about clipboard sharing and auto usb mounting to VM

  • @prajwaladhav3123
    @prajwaladhav3123 23 ชั่วโมงที่ผ่านมา

    My laptop speaker audio has been reduced recently, tried using Malwarebytes to remove malware since I thought of a correlation here, but I still think that my laptop is working weirdly

  • @johannoas1
    @johannoas1 วันที่ผ่านมา +1

    Ok that escaping is very specific on the used vm software and os you are running on, isn't it. I don't think quemu emulation would allow that, or would there be the same issues?

  • @lefreshbaguette
    @lefreshbaguette 12 ชั่วโมงที่ผ่านมา

    TLDW: yes, if they have worms on it/they can

  • @ZcorpLabs
    @ZcorpLabs วันที่ผ่านมา +1

    im not concerned about guest to host escape as its wildly unlikely, what im worried about is malware that requires an internet connection to run like some infostealers? wouldnt connecting the VM to the internet allow some LAN-escape to infect other REAL computers on the same network?

    • @greenumbrellacorp5744
      @greenumbrellacorp5744 17 ชั่วโมงที่ผ่านมา

      Thats why it should be isolated from the rest and firewalls in place. Some smart malwares that detect vm just behave nicely while at the vm so u think they r not doing anything nasty.

  • @jjrulez1596
    @jjrulez1596 วันที่ผ่านมา +3

    so i'll admit, im not that skilled, but i am aiming towards being a pen-tester personally (been interested in cyber sec for ~ the last 7 years, and actively learning the last 2-3ish), and before watching, my thought would be theoretically yes, but its gonna be easier for it todo network traversal, rather than direct VM escape (ie, you make the VM, and don't take it off the network by accident or whatever, and it jumps to your main system that way). Will edit after finishing the vid.
    Edit: after finishing, while I missed some of the more nuance portion (namely the last bit about AWS, and other VM sellers being the primary targets), I am glad to know I was more or less correct it would seem in that you have to have really bad luck w/ a 0 day (aka the "theorectically yes" portion), or user error. not trying to sound like im bragging or anything, more just proud that my thought process was accurate

    • @greenumbrellacorp5744
      @greenumbrellacorp5744 17 ชั่วโมงที่ผ่านมา

      yea directly escaping might be harder. What most do is just "behave nicely" under strange circunstances. That means some infected steam malware will just behave properly if it detects no network or a vm and it will just be "steam". U think its safe and when u run it outside of the vm it deploys the payload. Obv that approach wont work when you KNOW its malicious but the point is when finding IF it's malicious. If it behaves as expected under the vm and does what it says nothing more it may look safe.

  • @furhad
    @furhad วันที่ผ่านมา

    great video! out of curiosity, are there similar methods where malware can escape KERNEL VMs? like qume kvm and oracle virtual box running on docker containers?

  • @Deniil2000
    @Deniil2000 13 ชั่วโมงที่ผ่านมา

    depends on a virtual machine in question

  • @Johngabana-t3v
    @Johngabana-t3v 20 ชั่วโมงที่ผ่านมา

    All depends how malicious the malware is

  • @albertfinkelstein
    @albertfinkelstein 20 ชั่วโมงที่ผ่านมา

    Use a software based emulator running only in userspace. Further confined with selinux. Live boot the host OS. Safest way to virtualize.

  • @Hari-tv
    @Hari-tv 20 ชั่วโมงที่ผ่านมา

    Yes, its can happen if they works with infecting hardware not only system.

  • @tnt_champ1002
    @tnt_champ1002 วันที่ผ่านมา +2

    How about a VM inside a VM?

    • @Luka-qy5hl
      @Luka-qy5hl วันที่ผ่านมา +1

      7:36

  • @subieasunayuuki
    @subieasunayuuki 13 ชั่วโมงที่ผ่านมา

    Anything connected to the internet is not completly safe

  • @Maks7594
    @Maks7594 12 ชั่วโมงที่ผ่านมา

    just run a virtual machine in a virtual machine, problem solved

  • @methane1027
    @methane1027 17 ชั่วโมงที่ผ่านมา

    Short answer: It can if you set it up wrong.

  • @pelaajahacks8358
    @pelaajahacks8358 วันที่ผ่านมา

    i think you could enable hyper-v on windows while running a kvm on a linux host

  • @TheMumbles
    @TheMumbles 18 ชั่วโมงที่ผ่านมา

    Why does no one speak about kaspersky as an AV?

  • @We_Are_I_Am
    @We_Are_I_Am วันที่ผ่านมา

    If you can get hyper v to run inside virtual box to run inside vmware inside kvm...

  • @poolhalljunkie9
    @poolhalljunkie9 4 ชั่วโมงที่ผ่านมา

    Malware inception.

  • @justhere4637
    @justhere4637 วันที่ผ่านมา +2

    Mutahar be sweatin'.

  • @BestOsuPlayer
    @BestOsuPlayer 9 ชั่วโมงที่ผ่านมา

    but what if you run a vm inside a vm to counteract a vm escape, like wouldn't that work?

  • @w5ivee
    @w5ivee วันที่ผ่านมา +1

    hi mr eric

  • @x1hax
    @x1hax วันที่ผ่านมา

    The question is can u hack pc with eth cable .. other question can u hack using hardisk or gpu devices

  • @iEndyyi
    @iEndyyi วันที่ผ่านมา

    What about sandbox on windows 10pro ?

  • @InfinnacageMusic
    @InfinnacageMusic 23 ชั่วโมงที่ผ่านมา

    How private is Whonix?

  • @poocyx
    @poocyx 14 ชั่วโมงที่ผ่านมา +1

    great video.

  • @pedi-kun3978
    @pedi-kun3978 วันที่ผ่านมา

    i am waiting for cat ears

  • @AnonymousJack
    @AnonymousJack วันที่ผ่านมา

    HOW IS THAT POSSIBLE

  • @NeoVei
    @NeoVei วันที่ผ่านมา

    What about iPhones?

  • @ScarLeRenard
    @ScarLeRenard 12 ชั่วโมงที่ผ่านมา

    Do something about your voice EQ man, literally had to turn up the volume to hear you but my subwoofer started shaking because your voice is drowned in bass

  • @bigland-id3sv
    @bigland-id3sv วันที่ผ่านมา

    Its using a hardened vm on a rdp safe?

  • @BushraTahseen-t7q
    @BushraTahseen-t7q 21 ชั่วโมงที่ผ่านมา

    Malware cant escape triage tho. Or maybe triage is not a VM? Or doesn't work in a similar way

  • @anonymous_fox144
    @anonymous_fox144 15 ชั่วโมงที่ผ่านมา

    What if I run a VM..inside a VM,inside a VM? xD

  • @Pawlo370
    @Pawlo370 วันที่ผ่านมา +3

    can you turn on dark mode pls?

  • @redwinedrummer
    @redwinedrummer วันที่ผ่านมา +1

    Mr. Anderson...

  • @joa-p2m
    @joa-p2m วันที่ผ่านมา

    This also includes windows sandbox?

    • @JJFX-
      @JJFX- วันที่ผ่านมา

      The answer is always yes.

  • @hahayes1122
    @hahayes1122 วันที่ผ่านมา

    hello im escaped from vm, now im in da woda

  • @0xf444
    @0xf444 วันที่ผ่านมา

    I'm currently studying malware analysis and the common case is that Malware attempts to disable its functionality or makes analysis hellish if it detects that it's in a VM, because average malware authors don't have millions of dollars to exploit hardware related zero days.
    Most modern malware contains routines that check if the machine is a VM (it could check the given resources to the guest, or get the process list of the guest and checks for the VMware tools process and many other techniques that I haven't fully studied/known about yet..), and from there decide whether it executes its normal malicious behavior or just doesn't execute it's malicious payload.
    Additionally, when doing dynamic analysis (running the malware) you'd use services that simulate an internet connection in order to get an insight on what it does. (You wouldn't really allow the malware to connect to the internet directly, unless you're absolutely certain on what it does which you can know by using static analysis)
    On top of that, most of the time you'd have to uninstall VMware Tools because malware is on the lookout for that process and therefore you can't use shared folders to begin with.

  • @kevcraft9608
    @kevcraft9608 8 ชั่วโมงที่ผ่านมา

    I use triage to test malwere

  • @tablettablete186
    @tablettablete186 วันที่ผ่านมา

    Big YES

  • @JameBond007.
    @JameBond007. วันที่ผ่านมา

    Adding something that allows malware to escape a virtual machine definitely adds to the detectability and the size not to mention it's overly complex and limited use. So while it can happen it just isn't worth making or using

  • @insertOwO
    @insertOwO วันที่ผ่านมา

    can malware running inside of a windows vm infect a linux machine and how commen is this? (sorry if this is a stupid question)

    • @insertOwO
      @insertOwO วันที่ผ่านมา

      Because im thinking that it wouldn't be able to work inside a whole different system, but also, it could escape and then just secretly install the Linux version of the malware???

    • @abyssguardian
      @abyssguardian วันที่ผ่านมา

      ​@@insertOwO
      I actually don't believe this is possible at all.

    • @asunavk69
      @asunavk69 วันที่ผ่านมา +1

      The virus.exe thing if trying to target the host would have to run on wine, it could affect it negatively(cause wine can access your FS in userspace) but not widely affect the OS, like the root directory.
      Altho i am basing this from another video about how running exe virus can still affect your host smh, therefore the setup should alot better in that regard.

    • @Redstoneprojrjr
      @Redstoneprojrjr 23 ชั่วโมงที่ผ่านมา +1

      It has to do a vm escape then check if the operating system is linux and install a version of malware that supports linux

    • @HamsterLover1337
      @HamsterLover1337 19 ชั่วโมงที่ผ่านมา

      Yes it can, but requires more effort. If the malware is using an expensive 0-day, they might as well invest in cross-platform capabilities as well. At this point we are talking about nation-state actors.
      Most likely scenario is that a less advanced actor would try to abuse a known sandbox escape and focus on Windows to Windows.

  • @Bodwaizer
    @Bodwaizer วันที่ผ่านมา

    Escape the matrix 😅

  • @NameLess.__.
    @NameLess.__. วันที่ผ่านมา

    Could you do bakkesmod? I'm sure it's legit and safe

  • @theicewitch9328
    @theicewitch9328 วันที่ผ่านมา

    You really need to make a video about this? lol I already knew the answer.....

  • @JonathanSwiftUK
    @JonathanSwiftUK วันที่ผ่านมา

    Wow, of course it can, and it makes no difference if the machine is virtualized or not, it's called the network card. Many viruses scan the network for machines which are accessible and vulnerable, and try to infect it. Been there when it's happening. Some machines got infected as the network was coming up, whilst the OS was being installed.

  • @crimsonblue17
    @crimsonblue17 วันที่ผ่านมา

    third!

  • @Nobody-speedyspeedy
    @Nobody-speedyspeedy วันที่ผ่านมา +1

    No it can't but it Download beautiful copies of itself after break out of the virtuliziation. 😂😜😂

  • @ranibro
    @ranibro วันที่ผ่านมา

    Huh!?

  • @EclipseIsVeryAwesome
    @EclipseIsVeryAwesome วันที่ผ่านมา +1

    First like then watch

  • @jilligian1243
    @jilligian1243 วันที่ผ่านมา

    ELITE CONTENT - MCLIZ