As we exploit everyday lot and lot of targets, we may find that some of these targets are Virtual Machines! The nature of use for these VMs is first for security purposes, second for ease of
work. Well “security” is not good word in place anymore; we can now attack the VM itself and then exploit the Host which carries the Guest VM. Think of virtualization as a prison, and you
are trapped inside (just like the guest OS). Outside the prison there’s a Cherif, every time you try to escape, you get caught, pushed back in, and no matter what you do you can’t get out.Read more: Google Docs
work. Well “security” is not good word in place anymore; we can now attack the VM itself and then exploit the Host which carries the Guest VM. Think of virtualization as a prison, and you
are trapped inside (just like the guest OS). Outside the prison there’s a Cherif, every time you try to escape, you get caught, pushed back in, and no matter what you do you can’t get out.Read more: Google Docs