Hi all. I'm kind of new to VMWare Workstation, and I got a few questions:
Suppose that the host has neither installed AV/FW, and creates a VM (guest). The guest doesn't install AV/FW either, and is used to browse the internet, download files of dubious security and run these potential threats without caring whether the system will be damaged by the action. Unfortunately, the guest runs a virus, and becomes infected. Furthermore, the file was a trojan and the whole VM becomes remotely controlled by a malicious hacker.
My interrogations:
- is there theoretically any way, for the hacker, to find his way out of the "unimportant VM" and leak in the HOST system?
- what protection measures (except AV/FW the VM) would you recommend? e.g. using NAT instead of bridged, turning off file sharing between host/guest, do not install VMTools,...
- is NAT really a better choice in this case than Host or bridged network connection? P.S.: I have a router firewall at my disposition that I could use.
I've browsed a little bit in multiple forums, but found no satisfying answer to most of these questions.
Any help would be appreciated.
Thanks in advance!
Suppose that the host has neither installed AV/FW, and creates a VM (guest). The guest doesn't install AV/FW either, and is used to browse the internet, download files of dubious security and run these potential threats without caring whether the system will be damaged by the action. Unfortunately, the guest runs a virus, and becomes infected. Furthermore, the file was a trojan and the whole VM becomes remotely controlled by a malicious hacker.
My interrogations:
- is there theoretically any way, for the hacker, to find his way out of the "unimportant VM" and leak in the HOST system?
- what protection measures (except AV/FW the VM) would you recommend? e.g. using NAT instead of bridged, turning off file sharing between host/guest, do not install VMTools,...
- is NAT really a better choice in this case than Host or bridged network connection? P.S.: I have a router firewall at my disposition that I could use.
I've browsed a little bit in multiple forums, but found no satisfying answer to most of these questions.
Any help would be appreciated.
Thanks in advance!