Skip to content

Latest commit

 

History

History
21 lines (14 loc) · 1.03 KB

File metadata and controls

21 lines (14 loc) · 1.03 KB

Introduction

This repo contains a guide on setting up Virtualbox and QEMU for doing VM escape related security research.

It also contains a template for a userspace proof of concept that you can use to interact with emulated devices in the hypervisor code.

Note: if your Guest VM has secure boot enabled, you cannot use the above template. You must write a kernel module and sign it using the private key (accessible as long as you're root). I'll document how to do this some time in the future.

Contents

Useful links

  1. A full e1000 exploit in an LKM - https://github.com/cchochoy/e1000_fake_driver/
  2. Qemu VM Escape Case Study - http://www.phrack.org/issues/70/5.html