TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

DLL injection tool to unlock guest VMs

17 pointsby alter8over 12 years ago

3 comments

rwmjover 12 years ago
Why don't they just edit the password directly in the disk image (like this: <a href="http://libguestfs.org/virt-edit.1.html#non-interactive-editing" rel="nofollow">http://libguestfs.org/virt-edit.1.html#non-interactive-editi...</a> )?<p>I wrote a neat little tool called virt-dmesg which reads rather than writes kernel memory in VMs in order to pull out things like the kernel messages (dmesg): <a href="http://people.redhat.com/~rjones/virt-dmesg/" rel="nofollow">http://people.redhat.com/~rjones/virt-dmesg/</a><p>Also, since when is "Ubuntu" synonymous with Linux?
评论 #4800838 未加载
gnu8over 12 years ago
Remembering the "evil" discussion from not too long ago, these two statements are not compatible:<p>"This tool is for legal purposes only. The code is released under GPLv3 license."
评论 #4800869 未加载
评论 #4800965 未加载
评论 #4800942 未加载
评论 #4801170 未加载
评论 #4801634 未加载
btbuilderover 12 years ago
I'm not sure why a penetration tester would bother to run this against a VM when they had already obtained a privilege level that allows memory modification of the hypervisor process. That level of access is already the equivalent of physical access.
评论 #4802099 未加载