波音游戏源码-波音博彩公司评级_百家乐园天将_新全讯网3344111.c(中国)·官方网站

III. Exploitation on Virtualisation

by JUCC ISTF
/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ 
 
A virtualisation infrastructure represents an additional architectural layer which can suffer from security vulnerabilities and be the target of attacks. Generally, attacks can be categorised into: (1) concealing malicious code activities through detection of virtual machines, (2) denial of service on the virtual machine, and (3) virtual machine escape which is considered to be the most threatening type of attack.

Potential Vulnerabilities in Virtualisation Environment

1. Concealing malicious code activities through detection of VM - VM-specific Instructions in the CPU (including the CPUID instruction) would leak information about VM presence. The approaches used to detect the presence of VM or hypervisors usually rely on timing which demands for a comparison to executions without the presence of a hypervisor or require external time sources. Once the hackers detected the existence of VM, they can perform malicious code activities on the virtualisation layer. Malicious codes may alter the behaviour of VM, including refusing to run.

2. Denial of Service on the Virtual Machine - Apart from detection, virtual machine can be targets of attacks with the objectives to reduce the availability of VMs. Classical denial of service (DoS) attacks can lead to abnormal termination of VMs or high computational load (e.g. produced through infinite loops) which hinders the interaction of users or administrators with affected VMs.

3. Virtual Machine Escape - Virtual machine escape is an exploit that enables a hacker to move from within a virtual machine to the hypervisor, thereby gaining access to the entire computer and all the virtual machines running within it. In other word, the attacker can execute arbitrary code on the host system with the privileges of the virtual machine. This denotes a total compromise.

To minimise the chance of attacks by intruders and safeguard the virtual environment within the organisation, a series of hardening steps for the virtualisation environment have to be in placed properly. In next three sections, some hardening guidelines would be introduced to secure the environment for server virtualisation.

Historical Incident

VMware Multiple Denial Of Service Vulnerabilities

Some VMware products support storing configuration information in VMDB files. Under some circumstances, a malicious user could instruct the virtual machine process (VMX) to store malformed data, causing an error. This error could enable a successful Denial-of-Service attack on guest operating systems.
 
3U百家乐官网的玩法技巧和规则 | 百家乐官网群sun811| 百家乐怎样投注好| 天马娱乐城| 诸子百家乐的玩法技巧和规则| 百家乐官网桌布橡胶| 六合彩资料大全| 百家乐连开6把小| bet365网址yalanad| 百家乐定位胆技巧| 百家乐官网赌现金| 龙虎斗 | 百家乐真人娱乐平台| 广东百家乐官网网| 合川市| 免邮百家乐布桌| 红桃K百家乐官网的玩法技巧和规则 | 钱隆百家乐官网大师| 17pk棋牌官方下载| 百家乐与龙虎斗怎么玩| 百家乐官网大赢家书籍| 百家乐群| 网上百家乐好玩吗| 至尊百家乐官网年代| 大发888站| 百家乐赌机厂家| 金三角百家乐官网的玩法技巧和规则 | 百家乐官网小揽| 欧博线上娱乐| 百家乐任你博娱乐网| 百家乐官网麻将筹码币镭射贴膜| 百家乐官网博彩安全吗| 敦煌市| bet365资讯网| 大发888手机版下载安| 金域百家乐的玩法技巧和规则 | 金臂百家乐官网开户送彩金| 太阳城网络博彩| 大发888xp缺少casino| 康莱德百家乐的玩法技巧和规则 | 百家乐官网首选|