sempersecurus at gmail.com
Wed Oct 12 19:18:56 GMT 2005
I also use VMWare 5 WS quite a bit and have had no issues with any
guest to host contamination. A couple of items for consideration:
* Make sure your host OS is fully patched and hardened.
* Don't enable file (or print) sharing between your guest and host.
Don't use the VMWare "shared folder" for your sacrificial guest.
* Depending on how (or if) you have your VM machine connected to other
VM machines, you may wish to play around with "Custom mode" networking
for the guest to allow complete isolation of networking from the host.
* Use the "snapshot" feature prior to testing anything new.
On 10/12/05, Paul Marsh <pmarsh at nmefdn.org> wrote:
> Afternoon All:
> I want to start playing around with the latest and greatest viri
> and exploits to see what they do and how they function. My question is
> how secure is the system the vmware in running on? Are there best
> practices I need to follow in order to lock the vm down so I don't
> compromise the host system?
> Thanx, Paul
> The information in this transmittal (including attachments, if any) is privileged and confidential and is intended only for the recipient(s) listed above. Any review, use, disclosure, distribution or copying of this transmittal is prohibited except by or on behalf of the intended recipient. If you have received this transmittal in error, please notify me immediately by reply email and destroy all copies of the transmittal. Thank you.
> Using .Net? Need to know more about .Net Security?
> send all posts to list at lists.dshield.org
> To change your subscription options (or unsubscribe), see: http://www.dshield.org/mailman/listinfo/list
More information about the list