UNIT III Virtualization System Specific Attacks
UNIT III Virtualization System Specific Attacks
UNIT III Virtualization System Specific Attacks
Keystroke logging — Some VM technologies enable the logging of keystrokes and screen
updates to be passed across virtual terminals in the virtual machine, writing to host fi les and
permitting the monitoring of encrypted terminal connections inside the VM
VM monitoring from the host — Because all network packets coming from or going to a VM
pass through the host, the host may be able to affect the VM by the following:
Starting, stopping, pausing, and restart VMs
Monitoring and configuring resources available to the VMs, including CPU, memory, disk,
and network usage of VMs
Adjusting the number of CPUs, amount of memory, amount and number of virtual disks,
and number of virtual network interfaces available to a VM
Monitoring the applications running inside the VM
Viewing, copying, and modifying data stored on the VM’s virtual disks
Hypervisor Risks
• The hypervisor is the part of a virtual machine that allows host resource sharing
and enables VM/host isolation.
• One reason why the hypervisor is susceptible to risk is because it’s a software
program; risk increases as the volume and complexity of application code
increases.
• Major vulnerabilities inherent in the hypervisor consist of rogue hypervisor © 2010 IBM Corporation
VM-based rootkits can hide from normal malware detection systems by initiating a
“rogue” hypervisor and creating a cover channel to dump unauthorized code into
the system.
A properly designed rootkit could then stay “undetectable” to the host OS, resisting
attempts by malware detectors to discover and remove it.
© 2010 IBM Corporation
New Virtualization System-Specific Attacks
Rogue Hypervisors Rootkits or Hyper jacking:
Vitriol
Virtualization System Public Exploits
• VENOM refers to a security vulnerability that results from a buffer overflow in a kernel-level
driver included in many default virtualized environments.
• The VENOM vulnerability has the potential to provide attackers with access to the host
operating system and, as a result, other guest operating systems on the same host.
• VENOM, an acronym for Virtualized Environment Neglected Operations Manipulation, arises
from QEMU’s virtual Floppy Disk Controller (FDC), which carries a vulnerability that could
enable an attacker to run code by pairing one of two flawed commands related to the
controller with a buffer overflow.
• The VENOM vulnerability affects KVM, Xen and native QEMU virtual machines.
• Virtual machines running on Microsoft Hyper-V or VMware hypervisors are not affected by
VENOM.
• The VENOM vulnerability works with the default configuration of the affected virtualization
platforms, so even when the FDC drive has not been added to the platform, systems are still
© 2010 IBM Corporation
vulnerable.
New Virtualization System-Specific Attacks
External Modification of the Hypervisor:
Drop
Case Study: Virtualization System Public Exploits
■ 36 public exploits against production virtualization systems have been
released
■ Most of these are attacks against third-party components of
these systems
■ CVE-2009-2267
–Guest OS user can gain elevated privileges on guest OS by
exploiting a bug in handling of page faults
–Affects ESX server 4 and other VMware products
–Exploit binary posted at lists.grok.org.uk
VM migration
–Migration attack is an attack on the network during VM
migration from one place to another. This attack is an exploit
on the mobility of virtualization.
–Since VM images are easily moved between physical machines
through the network, enterprises constantly move VMs to
various places based on their usage.
–For example, VMs from a canceled customer may be moved to
a backup data center, and VMs that need maintenance may be
moved to a testing data center for changes.
–Thus, when VMs are on the network between secured
perimeters, attackers can exploit the network vulnerability to
gain unauthorized access to VMs.
– Similarly, the attackers can plant malicious code in the VM
images to plant attacks on data centers that VMs travel
between.
Migrating Virtual Machines
VM MIGRATION explained-
Video Animation-Flipped Activity
New Virtualization System-Specific Attacks
a) Warm Up Phase:
During copying all memory pages from source to destination, some memory pages changed
because of source machine CPU is active. All the changed memory pages are known as dirty pages.
All these dirty pages are required to recopy on destination machine; this phase is called as warm
up phase.
b) Stop & Copy Phase: Warm up phase is repeated until all the dirty pages recopied on
destination machine. This time CPU of source machine is deactivated till all memory pages will
transfer another machine. Ultimately at this time CPU of both source and destination is suspended,
this is known as down time phase. This is the main thing that has to explore in migration for its
optimization.
New Virtualization System-Specific Attacks
■ VM migration-Types and Techniques
2) Post- Copy Migration:
In this technique, VM at the source is suspended to start post copy VM
migration.
When VM is suspended, execution state of the VM (i.e. CPU state,
registers, non-pageable memory) is transferred to the target.
In parallel the sources actively send the remaining memory pages of
the VM to the target.
This process is known as pre-paging.
At the target, if the VM tries to access a page that has not been
transferred yet, it generates a page fault, also known as network faults.
These faults are redirect to the source, which responds with the faulted
pages.
Due to this, the performance of applications is degrading with number
of network faults.
To overcome this, pre-paging scheme is used to push pages after the
last fault by dynamically using page transmission order
New Virtualization System-Specific Attacks
■ Live VM migration steps of Google Compute Engine
New Virtualization System-Specific Attacks
■ VM migration
– VM migration is transfer of guest OS from one physical server to another with
little or no downtime
– Implemented by several virtualization products
– Provides high availability and dynamic load balancing