The reason MalwareBytes on your host machine is able to pick up these network requests is because VirtualBox just re-routes the internet connections from guest to host via NAT bridge. To MalwareBytes on host, it would appear as if VirtualBox is requesting these network connections. However you're still screwed if you have any shared folders that are active while these malware are infecting your computer.
but would the maleware even be able to do anything on the host with those shared folders (other then copying itself into it/infecting files/delting/encrypting files in it?) Without some sort of serious security exploint in windows just having a malious file shouldn't do anything even if it's on a shared folder on the host. Actually infecting the host requires you to go to the shared folter on the host and start in yourself. Of course if windows or virtualbox has some kind of exploit that let's it run automatically your really screwed, but having a shared folder alone shoudn't be enough on it's own either, it needs some kind of exploit.
actually in a technical point of view, you are not, because access to shared folders doesnt mean the host will run these files at all. It would be dangerous only if you had some sort of startup script inside a shared folder, and the virus modified that startup script to get some sort of special acess, but that would require imbearable hacking skills to program a virus that would be smart to do so. most viruses are simple and direct.
@@TechHowYT i think this is fine because the malware cant write to it it can only read that data and any write requests the malware sends should error out, but it is best to have them completely disabled for safety.
downloading virtual machine in a virtual machine in a virtual machine in a virtual machine in a virtual machine in a virtual machine in a virtual machine makes me feel comfortable
CPU and GPU: SIUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU
It's possible for malware to infect the host if there's a bug in the hypervisor or your cpu's virtualisation extensions, howeverthese are very rare and I don't think I've ever seen one before. You're more likely to be infect due to shared folders or havint the networking enabled on the VM
@@lavie69 I've seen a lot of viruses that detect VMs and start acting innocent, or just terminate, but I've never heard of one that nukes the host machine after detecting that it's in a VM. Could you provide an example?
The temp folder CAN hold executables. Especially when using installers, because most time they are unzipping an executable inside them and in order to run them they need a file location so they get dropped into Temp. This can also happen for example when you copy an exe in WinRar, it will copy the exe to the real filesystem into Temp and then copies the path so CTRL+V can put the exe somewhere else
Kinda scary and informative because some of these things are happening on my computer so you may have just informed me of something I had no idea about😅
Thank you so much for the video! I was searching about this topic a while ago and today I found your video in my recommendations page. Just what I was searching for. This video + reading the comment section has helped me a lot to understand. Greetings from a teacher :) (Systems&Networking is not my speciality but I use this tools with my students)
about malwarebytes blocking the "network" thing, it was because for your vm to be able to access internet, it need to go through your computer, through all of your firewall, which one of them is malwarebytes
I am so happy that I watch informative tech videos. This one especially. It taught me some things I didn't know about. So this is how hackers really get your pc to be a part of the botnet. This is really scary and now I will be even more careful than ever.
Virtualbox has a few convenience features like shared clipboard and drag and dropping files. You can set it to off, from only guest to host, from only host to guest, and bidirectional. Are these potential attack vectors for malware to exploit? If i keep it set to host to guest only or off would it be safer? I rarely need to ever pull anything _out_ of the guest system anyways. Usually only ever use such features to drop files _into_ the guest that I need, such as executables for example.
Our teacher at school made us download a linux iso to use within virtualbox. Now the .iso file was infected, starting a virtual machine with the .iso caused it to infect the entire pc and school network. Windows defender noticed but the damage was already done.
@@YourAverageNoobOnRoblox smh no it is not. Clearly you don't know really anything about it. Though yes it might be true that actual hackers prefer Linux because it's way more safe than shitty windows
@@MScienceCat2851 you can program and hack on any OS as long as the tools are there. On Linux though it might be easier to hack as you have full control over literally everything unlike windows. And the fact Linux is way better for concealing that you are a hacker
In case you are REALLY scared, enable isolation on the host and cutoff connections in cooporation with a very good antivirus software But at the end of the day, your best protection is YOU. just dont click on sussy things.
Would the Network spread be prevented by using a VPN on the Virtual Machine? I have a Mac and am looking to do a Virtual Machine of Windows/Linux/Home Assistant.
so it is correct to say that if i use windows and i want to try a cracked program on windows it will be safer to use dual boot and run ubuntu and here install a VM with windows so if a virus infect my virtual windows i wont affect me bc the host would be ubuntu?
Doesn't virtual box have a setting when setting up the vm to not allow the vm to access or communicate with the host machine. Does that eliminate the issue.
@Lifeen wow. With NAT, it is still possible to spread to host machine ! Can you please recommend me a malware family which works in VM environment, performs network activity but not spread on host machine ? Is it possible ? I want to capture the network traffic of this infected machine.
Hello Lifeen, there is nothing to worry about. While using Vmware, your host cannot get infected. This is due, if you do not share clipboards or folders, or even your network, you will be safe. But it has small chance for infect. So thanks for this video. I am looking forward.
You just have to disable all the features. There are scripts to make it easier. I remember when Enderman got his laptop almost killed as he started a virus on his XP machine and it went through the VMWare outside into his Windows 10 defender screaming.
Even if you turn off all shared stuff. It is possible to break out of the VM and escape the hypervisor (in this case VmBox) and access the host. Tho vmware and co regulary update their software to prevent such expliots. Check out BlackHat for more info.
it depends more on your activities, because you can have shared clipboards and folders, a bridged adapter and still not get infected. But if you are behaving badly, don't be surprised by the outcome ;)
@@user-lj4lo7cx7m I said "it depends MORE", not "exclusively".. before replying to just having the reason, read "unknown user". Of course a piece of software is never flawless, but in general terms, it's quite rare these ones get attacked succesfully
Very scary! Bravo to you good sir for being the testbed for our enjoyment! I think I’ll leave the virtual virus testing to more advanced folks…… for now lol
This is one of my favourite videos to watch, I don’t know what it’s called but these kind of creepy viruses and Trojan’s website videos are so interesting. Amazing video 👍🏻
Just asking as someone who dose not know this kind of thing is it possible to defeat this kind of problem with 2 hardware modems or networks. One for host connections and the other for the virtual machines where you prevented the installation on the opposite. Example: Network A or Modem A software installed on Host, but not Network B or Modem B. --- Network B or Modem B software Installed on VM, but not Network A or Modem A.
Thank You, you saved my computer. I was going to install vbox and then install windows and then Install a virus but when I watched this video I immediately knew the answer. Thank you
well... I got hacked a couple of months ago and it was because I downloaded software from malicious sites and I had binance app on pc so the hacker did sometihng called cookies hijacking and stole all of my crypto and now I`m thinking of putting my crypto exchanges apps on a vm and my sensitive stuff there my question is what if it was the other way around will my vm be safe? plz reply
a few questions: i have a windows 11 VM running on a headless arch linux system under QEMU accessed through VNC, i want to do malware testing on it but i'm concerned a worm could discover my SMB share and try to put something on there or spread to my main pc on the network which is win 10. would this be possible? if so, is there an argument i could pass to qemu to disable the guest system's networking?
you have GNU/Linux therefore you are safe. just delete all the bare metal windows on your network and use firewall on the host to block all the VMs from accessing any ports you do not explicitly allow. then everything will be secure.
oh if you don't want any network enabled in guest at all then that's quite easy too it's just the following argument for qemu-system-x86_64 when you execute it on the host: -nic none
If i have same folders on my usb / hardrive *Before* the virus, and than i disconnect my usb/hard drive than my computer gets infected than is my usb /hard drive safe?
around 9:50 when your host's Malwarebytes sends you an alert for blocked web traffic, I'm assuming this is simply because the Virtual Machine is piggybacking off of the host's network? And essentially there is nothing to worry about, it's just the network traffic inside the virtual machine being detected which does not affect the host? Only curious if you agree, I am a novice with this stuff.
@@lifeen i have SEP (Symantec Endpoint Protection) and i always wondered why am i getting pop-ups from antivirus when i am going to sites on VM. But now i know why 🙃
Nicely stated, PSY0PZ. The VM (or hypervisor) is just another process making requests and receiving responses which have to pass through the host's security protections. Of equal concern is that when requests leave the VM (without going through a VPN) - your actual IP Address (of your router) is now known. This will invite unwanted attention from BOTS looking for open ports or port forwarding weaknesses (RDP, etc., ) on your infrastructure.
@@d4sty. I fix it by running a VPN inside my VM. This allows me to use the VPN's servers to reach sites that I'm interested in connecting to with a different IP address and if required a different region. Your ISP will still see your IP address (of your router) and the VPN provider will too but the data you're sending and receiving is encrypted (within the VPN's tunnel). Your host (the physical computer running the VM) will not be able to unencrypt the data which means any anti-malware or anti-virus software running on the host will not be triggered.
The correct answer to this is it depends. But if a hypervisor 0day is present then the answer is yes a skilled and aware malware dev can escape the vm. Other methods can be shared directories as mentioned. Vuln software on your host machine if they vm is not on an isolated network. But also if you have a shared clipboard via methods like clipboard hijacking files.
So now I know why Mint virtual machines have little issue with shared folders, while Mac virtual machines are a nightmare to enable. Mint has very few viruses. Even Macs are more virus-prone!
I recall being remotely controlled by someone on the Internet, I was a silly kid that downloaded Munecraft forceop hacks and portforwarded to get my Minecraft server on the Internet
If you use virtual box, you can encrypt your internet ip and port. It is like using a separate wifi for your virtual box and your host machine. If you use that opetion i don't think it will spread to the host machine.
@@InfamousKoala if i use a different wifi in guest machine. will not virus escape to that other wifi"s connected device (other than host machine)? pls reply.
Bruh, once malicious website downloaded viruses in my computer, but it downloaded antivirus too. Viruses were neutralised after restart. They were just opening random websites
u sure because i used virtualbox so many times and put multiple viruses on one it didnt effect and the vm always said wired and i disconnect my internet on my main pc sometimes
Moral of the story: be MEGA carful while testing computer viruses in your vm, be sure that you use a different connection in ur vm and use a Malwarebytes in youre man host pc for protection 😉 Surf safely 😊
@@diasstebanak im curious, what if i use a proxy (windscribe) on both my vm and real machine, and also encrypt my network and ip on the vm, could it still possibly bypass that?
I'll be back with more vidz. I know its 2 years later, am still studying. I've noted your requests.
hello
hi
The reason MalwareBytes on your host machine is able to pick up these network requests is because VirtualBox just re-routes the internet connections from guest to host via NAT bridge. To MalwareBytes on host, it would appear as if VirtualBox is requesting these network connections. However you're still screwed if you have any shared folders that are active while these malware are infecting your computer.
but would the maleware even be able to do anything on the host with those shared folders (other then copying itself into it/infecting files/delting/encrypting files in it?) Without some sort of serious security exploint in windows just having a malious file shouldn't do anything even if it's on a shared folder on the host. Actually infecting the host requires you to go to the shared folter on the host and start in yourself. Of course if windows or virtualbox has some kind of exploit that let's it run automatically your really screwed, but having a shared folder alone shoudn't be enough on it's own either, it needs some kind of exploit.
actually in a technical point of view, you are not, because access to shared folders doesnt mean the host will run these files at all.
It would be dangerous only if you had some sort of startup script inside a shared folder, and the virus modified that startup script to get some sort of special acess, but that would require imbearable hacking skills to program a virus that would be smart to do so.
most viruses are simple and direct.
What if we are using something like Kasam to virtualize does it do the same ?
What if you have the shared folders set to read only within Virtual Box?
@@TechHowYT i think this is fine because the malware cant write to it it can only read that data and any write requests the malware sends should error out, but it is best to have them completely disabled for safety.
downloading virtual machine in a virtual machine in a virtual machine in a virtual machine in a virtual machine in a virtual machine in a virtual machine makes me feel comfortable
😇😁
CPU and GPU fans be like uuuuuuuuuuiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii
lmao 😂
@@akgamer3666 poor GPU bruh
CPU and GPU: SIUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU
I have never seen a text-to-speech youtuber with such great grammar!
Very informational video :)
It's possible for malware to infect the host if there's a bug in the hypervisor or your cpu's virtualisation extensions, howeverthese are very rare and I don't think I've ever seen one before.
You're more likely to be infect due to shared folders or havint the networking enabled on the VM
What if we are using something like Kasam
Some viruses detects the vm and nukes the host
@@lavie69 how would that happen?
@@dwlive732 What is kasam?
@@lavie69 I've seen a lot of viruses that detect VMs and start acting innocent, or just terminate, but I've never heard of one that nukes the host machine after detecting that it's in a VM. Could you provide an example?
The temp folder CAN hold executables. Especially when using installers, because most time they are unzipping an executable inside them and in order to run them they need a file location so they get dropped into Temp. This can also happen for example when you copy an exe in WinRar, it will copy the exe to the real filesystem into Temp and then copies the path so CTRL+V can put the exe somewhere else
OHHHHHHHHHHH
dude i was so scared when i saw executables in my temo folder, thanks!
Kinda scary and informative because some of these things are happening on my computer so you may have just informed me of something I had no idea about😅
Stop downloading porn torrents in your virtual box
@@enacku lmao
@@enacku "but the shady guy on quora with no source said it was okay!!!"
@@enacku No.
@@enacku No, i don’t think i will
Does your virtualbox have the network adapter configured as NAT or bridge?
Is there a safe way to just turn off the VBox VM wifi while running the "virus"? Trying to test some files out
Thank you so much for the video! I was searching about this topic a while ago and today I found your video in my recommendations page. Just what I was searching for. This video + reading the comment section has helped me a lot to understand. Greetings from a teacher :) (Systems&Networking is not my speciality but I use this tools with my students)
Thanks sir, for so nice n so useful programs you are giving us God Almighty bless you n your family
about malwarebytes blocking the "network" thing, it was because for your vm to be able to access internet, it need to go through your computer, through all of your firewall, which one of them is malwarebytes
I am so happy that I watch informative tech videos. This one especially. It taught me some things I didn't know about. So this is how hackers really get your pc to be a part of the botnet. This is really scary and now I will be even more careful than ever.
question would less severe viruses be tolerated and not be carried to the host?
Virtualbox has a few convenience features like shared clipboard and drag and dropping files. You can set it to off, from only guest to host, from only host to guest, and bidirectional. Are these potential attack vectors for malware to exploit? If i keep it set to host to guest only or off would it be safer? I rarely need to ever pull anything _out_ of the guest system anyways. Usually only ever use such features to drop files _into_ the guest that I need, such as executables for example.
Our teacher at school made us download a linux iso to use within virtualbox. Now the .iso file was infected, starting a virtual machine with the .iso caused it to infect the entire pc and school network. Windows defender noticed but the damage was already done.
bro linux is already a hacking operating system
@@YourAverageNoobOnRoblox smh no it is not. Clearly you don't know really anything about it. Though yes it might be true that actual hackers prefer Linux because it's way more safe than shitty windows
@@aleksandersats9577 ..and simple programmers a lot of the time, lol
@@aleksandersats9577 I thought hackers and programmers use linux brcause they have more control since its open source?
@@MScienceCat2851 you can program and hack on any OS as long as the tools are there. On Linux though it might be easier to hack as you have full control over literally everything unlike windows. And the fact Linux is way better for concealing that you are a hacker
In case you are REALLY scared, enable isolation on the host and cutoff connections in cooporation with a very good antivirus software
But at the end of the day, your best protection is YOU.
just dont click on sussy things.
haha yes
But what about the horny MILFs in my area?
@@wafflesncatsup5323 eat some catnip then idk
@@wafflesncatsup5323 wait wtf
@@tylern6420 meoww
goes much deeper than videos on this topic, very interesting
Would the Network spread be prevented by using a VPN on the Virtual Machine? I have a Mac and am looking to do a Virtual Machine of Windows/Linux/Home Assistant.
so it is correct to say that if i use windows and i want to try a cracked program on windows it will be safer to use dual boot and run ubuntu and here install a VM with windows so if a virus infect my virtual windows i wont affect me bc the host would be ubuntu?
The quickest way for it to get through is having a share folder on the host (shows up as a drive in the vm) it can speedrun
Doesn't virtual box have a setting when setting up the vm to not allow the vm to access or communicate with the host machine. Does that eliminate the issue.
@Lifeen wow. With NAT, it is still possible to spread to host machine !
Can you please recommend me a malware family which works in VM environment, performs network activity but not spread on host machine ?
Is it possible ?
I want to capture the network traffic of this infected machine.
Hi, whats the temp folders? What scope it has ? And I can delete it ?
What if you didn't have a bridged connection from you VM to your host?does that mean that the virus will only be contained in the VM?
Hello Lifeen, there is nothing to worry about. While using Vmware, your host cannot get infected. This is due, if you do not share clipboards or folders, or even your network, you will be safe. But it has small chance for infect. So thanks for this video. I am looking forward.
You just have to disable all the features. There are scripts to make it easier. I remember when Enderman got his laptop almost killed as he started a virus on his XP machine and it went through the VMWare outside into his Windows 10 defender screaming.
@@thisfeatureisbad 😁
@@thisfeatureisbad do you have the link to video?
Even if you turn off all shared stuff. It is possible to break out of the VM and escape the hypervisor (in this case VmBox) and access the host. Tho vmware and co regulary update their software to prevent such expliots. Check out BlackHat for more info.
@@TheFimiTube Yeah, plus there are private exploits. However, if you get infected just send the virus to VMWARE and report it.
Can you do the same with Bottles the wine prefix sandboxing tool?
These type of videos are very interesting
Thank you for risking ur machine for this video
The crack background is amazing. Anyways you helped me with the cracked apps.
it depends more on your activities, because you can have shared clipboards and folders, a bridged adapter and still not get infected. But if you are behaving badly, don't be surprised by the outcome ;)
Not really, there have been vulnerabilities with VirtualBox and VMware that can execute code from the guest machine to the host one
@@user-lj4lo7cx7m I said "it depends MORE", not "exclusively".. before replying to just having the reason, read "unknown user". Of course a piece of software is never flawless, but in general terms, it's quite rare these ones get attacked succesfully
@@whateverdope after you :)
bro talks like my spam folder :((((
Am i safe to use my microsoft account for the windows operating system?
for each track/instrunt?
If you get a advanced piece of malware that can go from virtual machine to host machine malware bytes isn't going to save you.
i think you're underestimating malwarebytes.
@@xeniight if u get some super advanced year 3500 virus nothign is stopping it
underrated channel
You tell many times you cant see whats going on... And my brain just screams: TASK MANAGER
Very scary! Bravo to you good sir for being the testbed for our enjoyment! I think I’ll leave the virtual virus testing to more advanced folks…… for now lol
Won't the virus just infect other users on the network the host is in?
just turn off your internet when u run the virus
@@lifeen turn off your hosts wifi
first off if network sharing is on then yes maybe, otherwise no.
Pull out your Ethernet cable on your host machine first.
idk maybe vpn
Any way to open the script without running it to check out the source code?
This is one of my favourite videos to watch, I don’t know what it’s called but these kind of creepy viruses and Trojan’s website videos are so interesting. Amazing video 👍🏻
The loquendo, the Pc vibe, the virus theme. I just love it. It's so creepy and nostalgic at the same time. Damn.
@@jyj-6414 honestly yeah, its all round just creepy with all of the malware having happy icons, it gives me goosebumps
music is very much needed on this content 🍿 love it
What Windows Defender says about all that?
Just asking as someone who dose not know this kind of thing is it possible to defeat this kind of problem with 2 hardware modems or networks. One for host connections and the other for the virtual machines where you prevented the installation on the opposite.
Example: Network A or Modem A software installed on Host, but not Network B or Modem B.
--- Network B or Modem B software Installed on VM, but not Network A or Modem A.
Yeah I think so
So its safe to run viruses on Vbox right?
someone of them are probably arent running cus its a vm as some are built to detect if its a vm
underated youtuber looking forward to more
More please! Hope you get to 1k subs!
what if i do an Virtual Machine on a virtual Machine.
?
Thank You, you saved my computer. I was going to install vbox and then install windows and then Install a virus but when I watched this video I immediately knew the answer. Thank you
I know this is an unnecessary tip, but you can press down your middle mouse button on a link in your browser to open a new tab with the website.
very informative ! I'll watch my back and try software on a VM now :) (I did when I was suspicous but you know ; never trust computers)
What if the virus was working and you just turn of the internet. Won't it stop the virus?
well... I got hacked a couple of months ago and it was because I downloaded software from malicious sites and I had binance app on pc so the hacker did sometihng called cookies hijacking and stole all of my crypto
and now I`m thinking of putting my crypto exchanges apps on a vm and my sensitive stuff there
my question is
what if it was the other way around will my vm be safe?
plz reply
a few questions: i have a windows 11 VM running on a headless arch linux system under QEMU accessed through VNC, i want to do malware testing on it but i'm concerned a worm could discover my SMB share and try to put something on there or spread to my main pc on the network which is win 10. would this be possible? if so, is there an argument i could pass to qemu to disable the guest system's networking?
you have GNU/Linux therefore you are safe. just delete all the bare metal windows on your network and use firewall on the host to block all the VMs from accessing any ports you do not explicitly allow. then everything will be secure.
oh if you don't want any network enabled in guest at all then that's quite easy too it's just the following argument for qemu-system-x86_64 when you execute it on the host: -nic none
Great video and very useful. Hope you could monetize it!
i feel like this is an ad for malwarebytes lmao
If i have same folders on my usb / hardrive *Before* the virus, and than i disconnect my usb/hard drive than my computer gets infected than is my usb /hard drive safe?
Yes, the files should be safe, but some ransomwares encrypts connected folders, so if you connect it back, it might get infected too
@@lifeen okay , thanks for the answer
i love how u explain everything, likes for u 👍
Pretty educational. I love it.
this feel like a whole movie lmao
thank you so much man i learned a lot in this video
around 9:50 when your host's Malwarebytes sends you an alert for blocked web traffic, I'm assuming this is simply because the Virtual Machine is piggybacking off of the host's network? And essentially there is nothing to worry about, it's just the network traffic inside the virtual machine being detected which does not affect the host? Only curious if you agree, I am a novice with this stuff.
@@lifeen i have SEP (Symantec Endpoint Protection) and i always wondered why am i getting pop-ups from antivirus when i am going to sites on VM. But now i know why 🙃
Nicely stated, PSY0PZ. The VM (or hypervisor) is just another process making requests and receiving responses which have to pass through the host's security protections. Of equal concern is that when requests leave the VM (without going through a VPN) - your actual IP Address (of your router) is now known. This will invite unwanted attention from BOTS looking for open ports or port forwarding weaknesses (RDP, etc., ) on your infrastructure.
@@laughingalien and how to fix that?
@@d4sty. I fix it by running a VPN inside my VM. This allows me to use the VPN's servers to reach sites that I'm interested in connecting to with a different IP address and if required a different region.
Your ISP will still see your IP address (of your router) and the VPN provider will too but the data you're sending and receiving is encrypted (within the VPN's tunnel). Your host (the physical computer running the VM) will not be able to unencrypt the data which means any anti-malware or anti-virus software running on the host will not be triggered.
Is it possible that the malware can spread to the host machine, uninstall all antivirus software in the background, and run it? That will be scary.
When installing windows 7 in a vm it did try to restart my host pc
easy fix: open a virtual machine in a virtual machine in a virtual machine. that why you will protect your computer a protection no hack able
@@lifeen or use an ENTIRE DIFFERENT operating system for the host
@@Jack_ekrjgterbtonr good idea
I do that lmao, or i use my old laptop tha has nothing bout me, and diff wifi
Can you use it to resetup s?
could you do one with a command shell host connection
It is entirely possible for that happen, but it would have to be a very smart exploit to make that happen.
The correct answer to this is it depends. But if a hypervisor 0day is present then the answer is yes a skilled and aware malware dev can escape the vm. Other methods can be shared directories as mentioned. Vuln software on your host machine if they vm is not on an isolated network. But also if you have a shared clipboard via methods like clipboard hijacking files.
i really apreciate your help with dowloanding this software
So now I know why Mint virtual machines have little issue with shared folders, while Mac virtual machines are a nightmare to enable. Mint has very few viruses. Even Macs are more virus-prone!
just watched this entire vid haha, i love it
guys i dont want to reset my computer i have programs can i delete all viruss normally?
I recall being remotely controlled by someone on the Internet, I was a silly kid that downloaded Munecraft forceop hacks and portforwarded to get my Minecraft server on the Internet
there was a time i ran noescape.exe on windows 10 and then it spreaded to my pc thankfully it couldn't work it just said an error
If you use virtual box, you can encrypt your internet ip and port. It is like using a separate wifi for your virtual box and your host machine. If you use that opetion i don't think it will spread to the host machine.
How give me step by step instructions 😁 please.
@@sydrul8756 when you lauch your vm there is gonna be a newtork tab in the settings. There you can use different netowrk for your inbuilt vm
What do people here mean by shared files can spread malware to host?
@@Tomas-ml9nv if you share files from an infected pc, it might be shared as well
@@InfamousKoala if i use a different wifi in guest machine. will not virus escape to that other wifi"s connected device (other than host machine)? pls reply.
Bruh, once malicious website downloaded viruses in my computer, but it downloaded antivirus too. Viruses were neutralised after restart. They were just opening random websites
u sure because i used virtualbox so many times and put multiple viruses on one it didnt effect
and the vm always said wired and i disconnect my internet on my main pc sometimes
they wont show commands in cmd because echo is off.
Moral of the story: be MEGA carful while testing computer viruses in your vm, be sure that you use a different connection in ur vm and use a Malwarebytes in youre man host pc for protection 😉
Surf safely 😊
bro where chalk up u been, it is so cool
What about virtual machine in website, i mean it not using your gateway
Bitdefender plus malwarebytes plus kaspersky = god trio
3:37 you can just press win+r to open run box and type appdata and enter then click local and temp (also open show hidden items)
a quicker way with the run box is to type %temp% into it.
@@SmilerRyanYT Oh yeah I forgot that
A hypervisor Exploit can be exploited to infect the host machine
What is the overall conclusion of this video?? Can the virus spread on the host machine?
If your VM isn’t in bridge mode, or isn’t on the same network does it still spread?
nope.
@@diasstebanak im curious, what if i use a proxy (windscribe) on both my vm and real machine, and also encrypt my network and ip on the vm, could it still possibly bypass that?
It's been a wild ride.
me watching without the audio and thinking when the virus is going to break the host machine
I know there are ways to check if the virus is ran in a vm and if it is and you have wifi/ethernet on it can infect your main pc
yes it can, it is called a virtual machine bypass or something i forgot
What if you open virtual box in virtual box and install viruses on virtual box on that virtual box?
🤣🤣
My 18 yr old sis was so scared for this to happend, he has almost no virtual machine experience
@@bloodbonnieking lmao
@@bloodbonnieking what virtual machine does to a mf
What AI generated voice do you use?
They won't delete the malware after this, there are countless videos about CNET and they hadn't deleted anything.
that was a nice video it definitely helped out, thankyou so much and you just earned a sub
At some point I think it dose because original file store in host pc
thanks for making this video.
I would have installed windows on another ssd or hdd instead of directly using my main machine
this background music is making me feel like its plague inc
Same lol
what if im using windows xp