Threats to VM's Flashcards
What is VM Escape?
VM’s are separated from other VM’s by default.
An attacker is able to break out of an isolated VM by interacting directly with the Hypervisor.
Relies on exploiting the physical resources between the VM’s. Very hard to do.
What are Data Remnants?
The contents of a VM that was shut down and deleted on a cloud-base server after the deprovisioning of that VM.
What is Privilege Elevation?
When a user grants themselves to run functions as a higher level user.
How can a man in the middle attack occur through Virtual Machines?
During a Live Migration, when a virtual machine is being moved from one server to another over the network. The attacker would have already infiltrated the network.
Does containerization mitigate hypervisor breaches?
No, if the hypervisor has been breeched, all the VM containers are at risk.