Skip to content

Vulnerability research notes for VirtualBox and QEMU. Contains debug environment setup notes, a PoC template, exploit primitive notes, and more.

Notifications You must be signed in to change notification settings

farazsth98/virtualbox-qemu-vuln-research-notes

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

20 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Introduction

This repo contains a guide on setting up Virtualbox and QEMU for doing VM escape related security research.

It also contains a template for a userspace proof of concept that you can use to interact with emulated devices in the hypervisor code.

Note: if your Guest VM has secure boot enabled, you cannot use the above template. You must write a kernel module and sign it using the private key (accessible as long as you're root). I'll document how to do this some time in the future.

Contents

Useful links

  1. A full e1000 exploit in an LKM - https://github.com/cchochoy/e1000_fake_driver/
  2. Qemu VM Escape Case Study - http://www.phrack.org/issues/70/5.html

About

Vulnerability research notes for VirtualBox and QEMU. Contains debug environment setup notes, a PoC template, exploit primitive notes, and more.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published