Tags » Virtualisation

How Splitting A Computer Into Multiple Realities Can Protect You From Hackers

Virtualisation, Sandboxes, Containers. All terms and technologies used for various reasons. Security is not always the main reason, but considering the details in this article, it is a valid point.  170 more words


ESXi Upgrade - Virtual Machines Drop From Network


Was in the process of upgrading ESXi servers, 5.0 to 5.5 and noticed a number of virtual machines were disconnected from network randomly.

Throughout this blog post, I will be going through: 555 more words


Mitigation techniques for management interfaces

In VMware’s hardening guide, they offer a number of mitigation techniques that can be used to further secure vCenter from exploitation. The majority of the recommended measures around securing vCenter are of an operational nature rather than reconfiguring settings within VMware. 449 more words


VM Migration Scenario #2


A few weeks ago, I was involved in decommissioning old ESXi servers due to out of warranty and for this work, I had to come up with a migration plan to evacuate virtual machines to a new cluster. 603 more words


Notes from SophosLabs: On the trail of rootkits and other malware

This is the first in an occasional series looking at some of the techniques we use in SophosLabs to help us take malware apart.

We hope you enjoy this article – if there are any topics you’d like us to cover in future articles, please let us know! 1,588 more words


Microsoft Virtualization

This week I’m playing with Windows Server 2012 R2 Hyper-V.

To start I thought I’d list the different type of Microsoft Virtualization

Microsoft’s basic definitions of the different types of Virtualization… 164 more words


Post exploitation on management interfaces

Once an attacker successfully gains admin access to a particular element of the management infrastructure, what is possible? In traditional networks, the compromise of an ‘Enterprise admin’ or ‘root’ would be a worst case scenario. 544 more words