Monday, October 26, 2009

Security through obscurity - virtualization and spoofing

In a comedy of errors I managed to completely lose access to a machine. Underlying hardware windows IP stack got taken over by a Linux stack in a VM with bridged IP ( I spoofed the host by assigning the same IP to the guest VM). I had perfectly inaccessible system (via network) with a windows machine pretending to be a linux machine for all intents and purposes.

Then I found an article on security through virtualization and spoofing, exactly what I had done by mistake. Here comes some more penicillin.
Post a Comment