![]() ![]() find a way to compromise your Kali machine.mount an attack while the VPN is open or have an esoteric way of attacking over HTB but using a direct internet connection as C2 (rather than just attacking over the internet in the first place).to find the IP address of the victim which, while it can repeat, is not guaranteed between connections.to be on the same part of the HTB network (for example EU server, US server, VIP server etc), which may increase the knowledge HTB have about you.to be on the HTB network itself which means you have no anonymity to the HTB staff (who can track the VPN connection you’ve used and associate that with an account if nothing else).Or would you just attack the host directly? If you were going to attack someone identical to you, would you do it that way? But that is an oversimplification.Īs a counter question - why are you asking this? Is it a generally theoretical question about VM escaping? Or (based on the threat title) are you asking about an attacker getting access to your host via the HTB connection on Kali? The simple answer is that it is possible. For a noob like me, it sounds like an attacker CAN compromise my guest respectively the LAN. Pinging back isn’t possible (depends on VirtualBox Network Settings). I can ping my host and other devices in hosts LAN from my VM. ![]() Well, it feels like you are describing a VPN tunnel but I’m not sure where this is going. Something like a ‘tunnel’ between guest and LAN-Gateway can’t exist, can it? The reason for this sounds trivial: the gateway lies in the LAN, so the guest needs a connection to the LAN. I’m reading about different Network-Settings in VirtualBox, but no one has properities like ‘The VM has ONLY access to the internet’. The more steps an attacker has to get through, the less likely it is they will work. The better way to think is to focus on “Is this likely”. In technology, most things are possible, (Stuxnet demonstrated an attack which can jump air gaps in 2009), even the ones we think are impossible are just down to no one having achieved it yet. Is it possible - the answer has to be “yes it is theoretically possible” but that might not be what you are really asking.įor example, if a nation-state has developed a way to escape Virtual Box sandboxing to attack the host, that isn’t the same as some random internet attacker looking to get a coinminer running. Information security is full of vague situations. Questions like this are difficult to honestly answer. Is it possible, that an attacker can break out of my VM to compromise my host? But I don’t know how to configure my VM (VirtualBox Settings) to keep my host-system safe. ![]() I’m interested to hear other suggestions. Keep you router firmware up to date and disable unneeded services (i.e.guest WIFI) - create separate for HTB and use that If your router supports multiple networks (i.e.There are some that have ‘escape to host’ vulnerabilities If you are using VM, keep your VM software up to date.If you are using VM to connect to HTB, change default user password and disable ssh login (if not required) or set to key based login only.That made me think of what one should do to limit the attack surface. ![]() “HTB Network is filled with security enthusiasts that have the skills and toolsets to hack systems and no matter how hard we try to secure you, we are likely to fail :P”ĭespite pt 5, if you think about it, its actually trivial to start attacking other members. “The network is built in such a way that direct communication between two member systems is prohibited.” ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |