TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Network Tunneling with QEMU

187 pointsby rrampageabout 1 year ago

6 comments

ytchabout 1 year ago
I&#x27;ve use this method recently. Our VM service is based on libvirt, which doesn&#x27;t support QEMU socket type interface natively, so I need to add the following to the XML:<p><pre><code> &lt;qemu:commandline&gt; &lt;qemu:arg value=&#x27;-netdev&#x27;&#x2F;&gt; &lt;qemu:arg value=&#x27;socket,id=mynet0,listen=10.6.0.1:12200&#x27;&#x2F;&gt; &lt;qemu:arg value=&#x27;-device&#x27;&#x2F;&gt; &lt;qemu:arg value=&#x27;virtio-net-pci,netdev=mynet0,id=net1,mac=58:a4:c0:a8:bf:51,bus=pci.0,addr=0x3&#x27;&#x2F;&gt; &lt;&#x2F;qemu:commandline&gt; </code></pre> On the other endpoint, a Linux TAP tunnel daemon is responsible for encapsulating packet to the Length-Value data as the article said.<p>In this way, I can create a L2 tunnel from remote site to the VM, also keep the VM untainted.
评论 #39617203 未加载
favourableabout 1 year ago
Slightly related, I remember reading once of malware that uses a virtual machine running TinyXP[0] to obfuscate itself from the host OS. The footprint of TinyXP is tiny compared to the latest versions of Windows and runs on very little RAM, and gets past reverse engineering ploys which aim to unravel what the malware does.<p>[0] <a href="https:&#x2F;&#x2F;archive.org&#x2F;details&#x2F;tiny-xp-rev-11" rel="nofollow">https:&#x2F;&#x2F;archive.org&#x2F;details&#x2F;tiny-xp-rev-11</a>
评论 #39618564 未加载
评论 #39617418 未加载
titannetabout 1 year ago
I don&#x27;t see the benefit for the attacker besides novelty. Am I missing something?
评论 #39616168 未加载
评论 #39621293 未加载
评论 #39615536 未加载
评论 #39616280 未加载
评论 #39616514 未加载
actionfromafarabout 1 year ago
So nothing actually ran on (one of) the Qemu?
评论 #39614367 未加载
评论 #39616384 未加载
bzmrgonzabout 1 year ago
Those sneaky bastards have weaponized QEMU!!
honeybadger1about 1 year ago
This case exemplifies the importance of a layered security approach, integrating endpoint protection and network monitoring, to effectively combat such stealthy techniques.