Threats to VM's Flashcards

1
Q

What is VM Escape?

A

VM’s are separated from other VM’s by default.

An attacker is able to break out of an isolated VM by interacting directly with the Hypervisor.

Relies on exploiting the physical resources between the VM’s. Very hard to do.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are Data Remnants?

A

The contents of a VM that was shut down and deleted on a cloud-base server after the deprovisioning of that VM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Privilege Elevation?

A

When a user grants themselves to run functions as a higher level user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How can a man in the middle attack occur through Virtual Machines?

A

During a Live Migration, when a virtual machine is being moved from one server to another over the network. The attacker would have already infiltrated the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Does containerization mitigate hypervisor breaches?

A

No, if the hypervisor has been breeched, all the VM containers are at risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly