Second off, it is very easy to unintentionally configure your VM such that the malware can escape via network and/or shared folders/drives. That being said, it is technically possible, especially if you're running malware that you don't fully understand and that may have all kinds of unknown functionality, so make sure you're at least running the latest patched version of virtualbox. So assuming you're not analyzing some newly discovered nation-state actor payload (and if you were, you'd be offering your own advice about this, not asking this question), you'll probably be safe in this regard. Also, exploits for such vulns (especially if they aren't already known) are going to be extremely valuable (they could compromise a whole lot of major networks), so they are unlikely to be deployed in garden variety phishing viruses or other such common source. However, the vulnerabilities that allow this are rare and patched very quickly when discovered, as they are a terrifying threat for countless businesses relying on this technology. You'd be better off with any.run or some other sandbox solution.įirst off, there are instances of malware escaping from a VM and attacking the underlying OS running the virtualization software. I'll go through some details below, but I would recommend you do some tutorials and labs and build up your skills a bit before doing this sort of thing, because it can be pretty tricky. There is no simple answer to that question-it depends on a number of things.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |