My VirtualBox use (so far) is old Dos and 16 bit Win apps in WinXP. Never needed Networking. On occasions of some freeware that gave more safety from PUP or Malware beyond the VM. Additionally was careful (same as on the Host) when using any Virtual access devices.
Curiously wondering. If I install the Extension Pack could that possibly give a background ability for Malware access?
USB use vulnerability?
-
- Site Moderator
- Posts: 20945
- Joined: 30. Dec 2009, 20:14
- Primary OS: MS Windows 10
- VBox Version: PUEL
- Guest OSses: Windows, Linux
Re: USB use vulnerability?
The manual says:
USB1 is already in Virtualbox. The EP primarily enables USB2&3 and RDP connectivity. Determine if any of these is dangerous of your malware concerns.The extension pack provides the following added functionality:
1. The virtual USB 2.0 (EHCI) device. See chapter 3.11.1, USB Settings, page 60.
2. The virtual USB 3.0 (xHCI) device. See chapter 3.11.1, USB Settings, page 60.
3. VirtualBox Remote Desktop Protocol (VRDP) support. See chapter 7.1, Remote Display
(VRDP Support), page 116. (also includes remote USB)
4. Host webcam passthrough. See chapter 9.5, Webcam Passthrough, page 247.
5. Intel PXE boot ROM.
6. Disk image encryption with AES algorithm. See chapter 9.28, Encryption of Disk Images, page 287.
-
- Posts: 20
- Joined: 14. Jan 2017, 22:45
- Primary OS: MS Windows 10
- VBox Version: PUEL
- Guest OSses: MS Win XP SP3
Re: USB use vulnerability?
Thanks I will read those also. Since I posted I've watched some videos. The summation was unless one is downloading apps with sophisticated malware, for the most part VirtualBox even with Guest Additions and Host Extensions is still a very safe efficient way to run most software on several OS. It is much more difficult for malware to break out of the VM than a normal host environment.
Notwithstanding that the info I gathered reports the safest way to run risky apps or test such would be the following:
(1) Use a sacrificial computer (if you have more than one).
Otherwise do an Image backup immediately prior.
(2) If you need networking enabled have computer behind 2nd Router on separate subnet.
Otherwise disable networking. (2nd Router good choice regardless)
(3) Have all diagnostic and debug software pre-installed.
(4) Nest the test VM inside a VM
(5) Run the nested VirtualBox with Guest additions ejected.
(did not see anything about the Host Extensions in Videos)
(6) Run a Snapshot first
(7) Revert back after diagnostics are recorded.
Notwithstanding that the info I gathered reports the safest way to run risky apps or test such would be the following:
(1) Use a sacrificial computer (if you have more than one).
Otherwise do an Image backup immediately prior.
(2) If you need networking enabled have computer behind 2nd Router on separate subnet.
Otherwise disable networking. (2nd Router good choice regardless)
(3) Have all diagnostic and debug software pre-installed.
(4) Nest the test VM inside a VM
(5) Run the nested VirtualBox with Guest additions ejected.
(did not see anything about the Host Extensions in Videos)
(6) Run a Snapshot first
(7) Revert back after diagnostics are recorded.