波音游戏-波音娱乐城赌球打不开

III. Exploitation on Virtualisation

by JUCC ISTF
/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ 
 
A virtualisation infrastructure represents an additional architectural layer which can suffer from security vulnerabilities and be the target of attacks. Generally, attacks can be categorised into: (1) concealing malicious code activities through detection of virtual machines, (2) denial of service on the virtual machine, and (3) virtual machine escape which is considered to be the most threatening type of attack.

Potential Vulnerabilities in Virtualisation Environment

1. Concealing malicious code activities through detection of VM - VM-specific Instructions in the CPU (including the CPUID instruction) would leak information about VM presence. The approaches used to detect the presence of VM or hypervisors usually rely on timing which demands for a comparison to executions without the presence of a hypervisor or require external time sources. Once the hackers detected the existence of VM, they can perform malicious code activities on the virtualisation layer. Malicious codes may alter the behaviour of VM, including refusing to run.

2. Denial of Service on the Virtual Machine - Apart from detection, virtual machine can be targets of attacks with the objectives to reduce the availability of VMs. Classical denial of service (DoS) attacks can lead to abnormal termination of VMs or high computational load (e.g. produced through infinite loops) which hinders the interaction of users or administrators with affected VMs.

3. Virtual Machine Escape - Virtual machine escape is an exploit that enables a hacker to move from within a virtual machine to the hypervisor, thereby gaining access to the entire computer and all the virtual machines running within it. In other word, the attacker can execute arbitrary code on the host system with the privileges of the virtual machine. This denotes a total compromise.

To minimise the chance of attacks by intruders and safeguard the virtual environment within the organisation, a series of hardening steps for the virtualisation environment have to be in placed properly. In next three sections, some hardening guidelines would be introduced to secure the environment for server virtualisation.

Historical Incident

VMware Multiple Denial Of Service Vulnerabilities

Some VMware products support storing configuration information in VMDB files. Under some circumstances, a malicious user could instruct the virtual machine process (VMX) to store malformed data, causing an error. This error could enable a successful Denial-of-Service attack on guest operating systems.
 
百家乐官网园百利宫娱乐城怎么样百家乐官网园百利宫娱乐城如何 | 精通百家乐的玩法技巧和规则 | 千亿国际娱乐城| 金鼎百家乐官网局部算牌法| 真钱百家乐游戏| 新化县| 德州扑克 下载| 百家乐注册彩金| 大世界百家乐官网的玩法技巧和规则| 澳门百家乐官网然后赢| 百家乐官网试玩网站| 都江堰市| 临清市| 百家乐官网庄的概率| 大发888娱乐场下载专区| 百家乐官网| 大发888游戏下载平台| 百家乐赌博代理| 布加迪百家乐官网的玩法技巧和规则| 金殿百家乐官网的玩法技巧和规则| 百家乐官网是不是有技巧| 香港六合彩彩图| 澳门足球博彩网站| 威尼斯人娱乐场是真的吗| 沈阳娱网棋牌官方下载| 凤凰百家乐的玩法技巧和规则| 公海百家乐的玩法技巧和规则| 百家乐分析网| 百家乐网真人真钱群| 真人百家乐官网免费送钱| 百家乐官网高手论坛| 百家乐官网下注法| 百家乐娱乐优惠| 百家乐好津乐汇| 零点棋牌下载| 百家乐官网投注翻倍方法| 百家乐官网金海岸娱乐| 网上百家乐官网真实吗| 新天地百家乐官网的玩法技巧和规则 | 淘金百家乐的玩法技巧和规则 | 真人赌钱|