Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations IamaSherpa on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

VMWare Leakage Protection

Status
Not open for further replies.

tofu101

Technical User
Sep 13, 2007
1
CA
Hi all. I'm kind of new to VMWare Workstation, and I got a few questions:

Suppose that the host has neither installed AV/FW, and creates a VM (guest). The guest doesn't install AV/FW either, and is used to browse the internet, download files of dubious security and run these potential threats without caring whether the system will be damaged by the action. Unfortunately, the guest runs a virus, and becomes infected. Furthermore, the file was a trojan and the whole VM becomes remotely controlled by a malicious hacker.


My interrogations:

- is there theoretically any way, for the hacker, to find his way out of the "unimportant VM" and leak in the HOST system?

- what protection measures (except AV/FW the VM) would you recommend? e.g. using NAT instead of bridged, turning off file sharing between host/guest, do not install VMTools,...

- is NAT really a better choice in this case than Host or bridged network connection? P.S.: I have a router firewall at my disposition that I could use.


I've browsed a little bit in multiple forums, but found no satisfying answer to most of these questions.

Any help would be appreciated.
Thanks in advance! :)
 
Status
Not open for further replies.

Part and Inventory Search

Sponsor

Back
Top