Hacker News new | past | comments | ask | show | jobs | submit login

Some thoughts: VMs are an interesting case. Someone with the motive and means would have exploits to get out of the VM. This is probably easier if the guest is running something to accelerate (e.g. VMWare Tools / VirtualBox Guest Additions.) Once you get out, you have to account for the host OS. Assuming you could do it, how does one determine if the VM is part of a honeypot or the target?



Not really. Consider how many hypervisors are there really to exploit from a virtual OS?

Maybe four.

HyperV, KVM, ESX, what you mentioned, etc...

But really, 3 vendors - Oracle, Microsoft, and VMWare covers the majority.

Way fewer virtualization technologies (mainstream) than hard drive firmwares.




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: