Oracle VM Virtualbox User Manual

Total Page:16

File Type:pdf, Size:1020Kb

Oracle VM Virtualbox User Manual Oracle VM VirtualBox R User Manual Version 5.0.6 c 2004-2015 Oracle Corporation http://www.virtualbox.org Contents 1 First steps 11 1.1 Why is virtualization useful?............................. 12 1.2 Some terminology................................... 12 1.3 Features overview................................... 13 1.4 Supported host operating systems.......................... 15 1.5 Installing VirtualBox and extension packs...................... 16 1.6 Starting VirtualBox.................................. 17 1.7 Creating your first virtual machine......................... 18 1.8 Running your virtual machine............................ 21 1.8.1 Starting a new VM for the first time.................... 21 1.8.2 Capturing and releasing keyboard and mouse.............. 22 1.8.3 Typing special characters.......................... 23 1.8.4 Changing removable media......................... 24 1.8.5 Resizing the machine’s window...................... 24 1.8.6 Saving the state of the machine...................... 25 1.9 Using VM groups................................... 26 1.10 Snapshots....................................... 26 1.10.1 Taking, restoring and deleting snapshots................. 27 1.10.2 Snapshot contents.............................. 28 1.11 Virtual machine configuration............................ 29 1.12 Removing virtual machines.............................. 30 1.13 Cloning virtual machines............................... 30 1.14 Importing and exporting virtual machines..................... 31 1.15 Global Settings.................................... 32 1.16 Alternative front-ends................................. 32 2 Installation details 34 2.1 Installing on Windows hosts............................. 34 2.1.1 Prerequisites................................. 34 2.1.2 Performing the installation......................... 34 2.1.3 Uninstallation................................ 36 2.1.4 Unattended installation........................... 36 2.2 Installing on Mac OS X hosts............................. 36 2.2.1 Performing the installation......................... 36 2.2.2 Uninstallation................................ 36 2.2.3 Unattended installation........................... 36 2.3 Installing on Linux hosts............................... 36 2.3.1 Prerequisites................................. 36 2.3.2 The VirtualBox kernel module....................... 37 2.3.3 Performing the installation......................... 38 2.3.4 The vboxusers group............................ 41 2.3.5 Starting VirtualBox on Linux........................ 41 2.4 Installing on Solaris hosts.............................. 42 2.4.1 Performing the installation......................... 42 2.4.2 The vboxuser group............................. 42 2.4.3 Starting VirtualBox on Solaris....................... 43 2 Contents 2.4.4 Uninstallation................................ 43 2.4.5 Unattended installation........................... 43 2.4.6 Configuring a zone for running VirtualBox................ 43 3 Configuring virtual machines 44 3.1 Supported guest operating systems......................... 44 3.1.1 Mac OS X guests............................... 45 3.1.2 64-bit guests................................. 45 3.2 Emulated hardware.................................. 46 3.3 General settings.................................... 47 3.3.1 “Basic” tab.................................. 47 3.3.2 “Advanced” tab............................... 47 3.3.3 “Description” tab.............................. 48 3.4 System settings.................................... 48 3.4.1 “Motherboard” tab............................. 48 3.4.2 “Processor” tab............................... 50 3.4.3 “Acceleration” tab.............................. 50 3.5 Display settings.................................... 51 3.6 Storage settings.................................... 52 3.7 Audio settings..................................... 54 3.8 Network settings................................... 54 3.9 Serial ports...................................... 54 3.10 USB support...................................... 56 3.10.1 USB settings................................. 56 3.10.2 Implementation notes for Windows and Linux hosts........... 57 3.11 Shared folders..................................... 58 3.12 Alternative firmware (EFI).............................. 58 3.12.1 Video modes in EFI............................. 58 3.12.2 Specifying boot arguments......................... 59 4 Guest Additions 60 4.1 Introduction...................................... 60 4.2 Installing and Maintaining Guest Additions..................... 61 4.2.1 Guest Additions for Windows........................ 61 4.2.2 Guest Additions for Linux.......................... 65 4.2.3 Guest Additions for Solaris......................... 69 4.2.4 Guest Additions for OS/2.......................... 70 4.3 Shared folders..................................... 70 4.3.1 Manual mounting.............................. 71 4.3.2 Automatic mounting............................ 72 4.4 Drag’n Drop...................................... 73 4.4.1 Supported formats............................. 74 4.5 Hardware-accelerated graphics........................... 74 4.5.1 Hardware 3D acceleration (OpenGL and Direct3D 8/9)......... 74 4.5.2 Hardware 2D video acceleration for Windows guests........... 76 4.6 Seamless windows.................................. 76 4.7 Guest properties.................................... 77 4.8 Guest control..................................... 79 4.9 Memory overcommitment.............................. 79 4.9.1 Memory ballooning............................. 79 4.9.2 Page Fusion................................. 80 5 Virtual storage 82 5.1 Hard disk controllers: IDE, SATA (AHCI), SCSI, SAS, USB MSC.......... 82 3 Contents 5.2 Disk image files (VDI, VMDK, VHD, HDD)..................... 85 5.3 The Virtual Media Manager............................. 86 5.4 Special image write modes.............................. 87 5.5 Differencing images.................................. 89 5.6 Cloning disk images.................................. 91 5.7 Host I/O caching................................... 91 5.8 Limiting bandwidth for disk images......................... 92 5.9 CD/DVD support................................... 93 5.10 iSCSI servers...................................... 93 6 Virtual networking 95 6.1 Virtual networking hardware............................. 95 6.2 Introduction to networking modes.......................... 96 6.3 Network Address Translation (NAT)......................... 97 6.3.1 Configuring port forwarding with NAT.................. 97 6.3.2 PXE booting with NAT............................ 98 6.3.3 NAT limitations............................... 98 6.4 Network Address Translation Service (experimental)............... 99 6.5 Bridged networking.................................. 100 6.6 Internal networking.................................. 101 6.7 Host-only networking................................. 102 6.8 UDP Tunnel networking............................... 103 6.9 VDE networking.................................... 103 6.10 Limiting bandwidth for network I/O......................... 104 6.11 Improving network performance........................... 105 7 Remote virtual machines 106 7.1 Remote display (VRDP support)........................... 106 7.1.1 Common third-party RDP viewers..................... 106 7.1.2 VBoxHeadless, the remote desktop server................. 107 7.1.3 Step by step: creating a virtual machine on a headless server...... 108 7.1.4 Remote USB................................. 110 7.1.5 RDP authentication............................. 110 7.1.6 RDP encryption............................... 111 7.1.7 Multiple connections to the VRDP server................. 112 7.1.8 Multiple remote monitors.......................... 113 7.1.9 VRDP video redirection........................... 113 7.1.10 VRDP customization............................. 113 7.2 Teleporting...................................... 114 8 VBoxManage 116 8.1 Introduction...................................... 116 8.2 Commands overview................................. 117 8.3 General options.................................... 127 8.4 VBoxManage list................................... 127 8.5 VBoxManage showvminfo.............................. 128 8.6 VBoxManage registervm / unregistervm...................... 129 8.7 VBoxManage createvm................................ 130 8.8 VBoxManage modifyvm............................... 130 8.8.1 General settings............................... 130 8.8.2 Networking settings............................. 133 8.8.3 Miscellaneous settings........................... 135 8.8.4 Video Capture settings........................... 136 8.8.5 Remote machine settings.......................... 137 4 Contents 8.8.6 Teleporting settings............................. 138 8.8.7 Debugging settings............................. 138 8.9 VBoxManage clonevm................................ 138 8.10 VBoxManage import................................. 139 8.11 VBoxManage export.................................. 140 8.12 VBoxManage startvm................................. 141 8.13 VBoxManage controlvm............................... 141 8.14 VBoxManage discardstate.............................. 144 8.15 VBoxManage adoptstate............................... 144 8.16 VBoxManage snapshot................................ 144 8.17 VBoxManage closemedium.............................. 145 8.18 VBoxManage storageattach.............................. 145 8.19 VBoxManage storagectl...............................
Recommended publications
  • Attacker Chatbots for Randomised and Interactive Security Labs, Using Secgen and Ovirt
    Hackerbot: Attacker Chatbots for Randomised and Interactive Security Labs, Using SecGen and oVirt Z. Cliffe Schreuders, Thomas Shaw, Aimée Mac Muireadhaigh, Paul Staniforth, Leeds Beckett University Abstract challenges, rewarding correct solutions with flags. We deployed an oVirt infrastructure to host the VMs, and Capture the flag (CTF) has been applied with success in leveraged the SecGen framework [6] to generate lab cybersecurity education, and works particularly well sheets, provision VMs, and provide randomisation when learning offensive techniques. However, between students. defensive security and incident response do not always naturally fit the existing approaches to CTF. We present 2. Related Literature Hackerbot, a unique approach for teaching computer Capture the flag (CTF) is a type of cyber security game security: students interact with a malicious attacker which involves collecting flags by solving security chatbot, who challenges them to complete a variety of challenges. CTF events give professionals, students, security tasks, including defensive and investigatory and enthusiasts an opportunity to test their security challenges. Challenges are randomised using SecGen, skills in competition. CTFs emerged out of the and deployed onto an oVirt infrastructure. DEFCON hacker conference [7] and remain common Evaluation data included system performance, mixed activities at cybersecurity conferences and online [8]. methods questionnaires (including the Instructional Some events target students with the goal of Materials Motivation Survey (IMMS) and the System encouraging interest in the field: for example, PicoCTF Usability Scale (SUS)), and group interviews/focus is an annual high school competition [9], and CSAW groups. Results were encouraging, finding the approach CTF is an annual competition for students in Higher convenient, engaging, fun, and interactive; while Education (HE) [10].
    [Show full text]
  • Ovirt and Openstack Storage (Present and Future)
    oVirt and OpenStack Storage (present and future) Federico Simoncelli Principal Software Engineer, Red Hat January 2014 1 Federico Simoncelli – oVirt and OpenStack Storage (present and future) Agenda ● Introduction ● oVirt and OpenStack Overview ● Present ● oVirt and Glance Integration ● Importing and Exporting Glance Images ● Current Constraints and Limitations ● Future ● Glance Future Integration ● Keystone Authentication in oVirt ● oVirt and Cinder Integration 2 Federico Simoncelli – oVirt and OpenStack Storage (present and future) oVirt Overview ● oVirt is a virtualization management application ● manages hardware nodes, storage and network resources, in order to deploy and monitor virtual machines running in your data center ● Free open source software released under the terms of the Apache License 3 Federico Simoncelli – oVirt and OpenStack Storage (present and future) The oVirt Virtualization Architecture 4 Federico Simoncelli – oVirt and OpenStack Storage (present and future) OpenStack Overview ● Cloud computing project to provide an Infrastructure as a Service (IaaS) ● Controls large pools of compute, storage, and networking resources ● Free open source software released under the terms of the Apache License ● Project is managed by the OpenStack Foundation, a non-profit corporate entity established in September 2012 5 Federico Simoncelli – oVirt and OpenStack Storage (present and future) OpenStack Glance Service ● Provides services for discovering, registering, and retrieving virtual machine images ● RESTful API that allows querying
    [Show full text]
  • Oracle Virtualbox Installation, Setup, and Ubuntu Introduction
    ORACLE VIRTUALBOX INSTALLATION, SETUP, AND UBUNTU INTRODUCTION • VirtualBox is a hardware virtualization program. • Create virtual computers aka virtual machines. • Prototyping, sandboxing, testing. • The computer that VirtualBox is installed on is called the “host”, and each virtual machine is called a “guest”. PREREQUISITES Since virtual machines share resources with the host computer, we need to know what resources we have available on our host. • Click “Type here to search”. • Search for “System Information”. • Note the number of processor cores and the amount of RAM installed in your host. PREREQUISITES • Expand “Components”. • Expand “Storage”. • Select “Drives”. • Note the amount of free space available on your host. Every computer is different, so how we will need to balance these resources between our host and guest systems will differ. DOWNLOADING VIRTUALBOX • VISIT VIRTUALBOX.ORG • SELECT THE CORRECT PACKAGE • CLICK THE DOWNLOAD LINK. FOR YOUR HOST. INSTALLING VIRTUALBOX • Browse to where you downloaded VirtualBox and run the installer. • All default options will be fine. Simply follow the prompts. INSTALLING VIRTUALBOX • CLICK “FINISH”. • VIRTUALBOX INSTALLED! SETTING THINGS UP Before we build our first virtual machine, we need to download an operating system to install as our “guest”. • Visit Ubuntu.com • Click “Download”. • Select the current Ubuntu Desktop “LTS” release. • LTS releases focus on stability rather than cutting edge features. SETTING THINGS UP • IN VIRTUALBOX, CLICK “NEW”. • NAME THE VIRTUAL MACHINE. SETTING THINGS UP Here’s where we will need the system resources information that we looked up earlier. Each virtual machine functions like a separate computer in and of itself and will need to share RAM with the host.
    [Show full text]
  • Vmware Workstation Pro 16.0 Using Vmware Workstation Pro
    Using VMware Workstation Pro VMware Workstation Pro 16.0 Using VMware Workstation Pro You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ VMware, Inc. 3401 Hillview Ave. Palo Alto, CA 94304 www.vmware.com © Copyright 2020 VMware, Inc. All rights reserved. Copyright and trademark information. VMware, Inc. 2 Contents Using VMware Workstation Pro 14 1 Introduction and System Requirements 15 Host System Requirements for Workstation Pro 15 Processor Requirements for Host Systems 15 Supported Host Operating Systems 16 Memory Requirements for Host Systems 16 Display Requirements for Host Systems 16 Disk Drive Requirements for Host Systems 17 Local Area Networking Requirements for Host Systems 18 ALSA Requirements 18 Virtual Machine Features and Specifications 18 Supported Guest Operating Systems 18 Virtual Machine Processor Support 18 Virtual Machine Chipset and BIOS Support 19 Virtual Machine Memory Allocation 19 Virtual Machine Graphics and Keyboard Support 19 Virtual Machine IDE Drive Support 19 Virtual Machine SCSI Device Support 20 Virtual Machine Floppy Drive Support 20 Virtual Machine Serial and Parallel Port Support 20 Virtual Machine USB Port Support 20 Virtual Machine Mouse and Drawing Tablet Support 21 Virtual Machine Ethernet Card Support 21 Virtual Machine Networking Support 21 Virtual Machine Sound Support 21 2 Installing and Using Workstation Pro 23 Obtaining the Workstation Pro Software and License Key 23 Trial Version Expiration Date Warnings 24 Installing Workstation Pro with Other VMware Products 24 Reinstalling Workstation Pro When Upgrading a Windows Host Operating System 24 Installing the Integrated Virtual Debuggers for Eclipse 25 Installing Workstation Pro 25 Install Workstation Pro on a Windows Host 26 Run an Unattended Workstation Pro Installation on a Windows Host 26 Install Workstation Pro on a Linux Host 28 Upgrading Workstation Pro 31 VMware, Inc.
    [Show full text]
  • Oracle VM Virtualbox Data Sheet
    ORACLE DATA SHEET ORACLE VM VIRTUALBOX KEY FEATURES Oracle VM VirtualBox is cross-platform virtualization software that allows you • Available for Windows, Mac OS X, Linux to extend your existing computer to run multiple operating systems at the same and Oracle Solaris host operating systems time. Designed for IT professionals, Oracle VM VirtualBox runs on Windows, • Supports a wide-range of guest Mac OS X, Linux and Oracle Solaris systems and is ideal for testing, platforms developing, demonstrating and deploying solutions across multiple platforms on • Easy to use graphical user interface one machine. • Powerful, scriptable command-line interface • Import and export virtual machines using OVF/OVA standards • Shared folders between guest vm and host machine • Seamless, resizable, and full screen window display modes • Video and 3D (OpenGL, DirectX) acceleration • Multiple virtual screen support • Powerful and flexible networking options • USB and serial ports • SAS, SATA, SCSI and IDE storage controllers • Built-in iSCSI initiator • Built-in Remote Display Server • Multi-generational branched snapshots • Linked and Full Clones • Controllable Copy-and-Paste • VM Groups Easy to use, Fast and Powerful, Great Platform coverage KEY BENEFITS Designed for use on systems ranging from ultrabooks to high-end server class hardware, • Run almost any type of application on your existing machine Oracle VM VirtualBox is lightweight and easy to install and use. Yet under the deceptively simple exterior lies an extremely fast and powerful virtualization engine. With a formidable • Quickly and easily try out new platforms reputation for speed and agility, Oracle VM VirtualBox contains innovative features to deliver • Create an optimum test and tangible business benefits: significant performance improvements; a more powerful development environment virtualization system; and a wider range of supported guest operating system platforms.
    [Show full text]
  • Exploring Open Source Wireless Tools by Jake Snyder (The Dread Pirate Roberts) @Jsnyder81 Who Am I?
    Exploring Open Source Wireless Tools By Jake Snyder (The Dread Pirate Roberts) @jsnyder81 Who am I? • Wireless Engineer at CompuNet Inc • CCIE-W #43153 • CWNE #161 • Security Enthusiast • Linux hobbiest • Wireless Field Day Delegate (http://techfieldday.com/event/wfd8/) • Blogger • Maker What does a set of professional tools cost? What I use at work: Ekahau ESS: $4000 Omnipeek: $2500 Chanalyzer + WiSpy: $1250 Aircheck: $2000 *All prices are approximates Professional tools in my first year. • Airmagnet Survey pro • Yup, that was it. http://www.popsugar.com/entertainment/Princess-Bride-Quotes-35919789#photo-35919789 “I mean, if we only had a wheelbarrow, that would be something.” -Westley Sometimes you have to build a wheelbarrow • Linux VM • Proxim 8494 • Airmon-NG • Wireshark “Well, why didn’t you list that among our assets in the first place” -Westley All these tools… Why Open Source? Pros: Cons: • Low Cost • Free if your time is worth • Flexibility nothing • Lots of available tools • Pieces of a solution, you have to put it together • Low barrier to entry • Requires knowledge • Time = investment “Please consider opensource as an alternative to suicide.” – Prince Humperdink What are my hobbiest opensource costs? Options for todays presentation: Raspberry PI: $223 Intel NUC $436 Raspberry PI 2B $38 NUC5CPYH: $134.00 ASUS USB-N53 $45 8G Memory: $34 Micro SD Card: $15 SSD: $40 Case: $5 Intel 7265 $28 Ubertooth: $120 WiSpy 2.4Ghz: $200 Existing Laptop: $8 • USB stick to boot linux • The chocolate coating makes it go down easier • VM is an option, albeit not a good one My Preferred Wireless Adapters • Asus USB-N53 • Intel 726x • 802.11n • 802.11ac • 2x2:2 • 2x2:2 • USB 2.0 • Mini PCIe half height and m.2 • Ralink RT3572 using RT2800 Driver • Intel IWLWIFI: Non-Free firmware • Works on Raspberry PI required • $45 on Amazon • $27 on amazon • Has issues with Deauth/Dissassoc • Lots of clients using them packets not being passed to host.
    [Show full text]
  • Managed Conversion of Guests to Ovirt
    Managed Conversion of Guests to oVirt Arik Hadas Senior Software Engineer Red Hat 21/8/15 KVM Forum, August 2015 Agenda ● Motivation ● Architecture ● Demonstration ● Implementation ● Future work KVM Forum, August 2015 Many ways to run Virtual Machines ● There are many virtualization tools ● Different hypervisors – KVM, E !"E Xi, Xen, VirtualBo$, .%% ● Different management systems – oVirt, virt'manager, v phere, Ganeti, .%% KVM Forum, August 2015 “I don't want to lose my VMs” ● Virtualization technologies are used for a long time ● +o standardization ● ,eople are tied up to the technologies they currently use ● Conversion tools are neede). KVM Forum, August 2015 virt-v2v ● ,art of virt tools – /pen source virtualization management tools ● Foreign hypervisor -0 KVM ● Standalone conversion tool KVM Forum, August 2015 Conversion to oVirt using virt-v2v ● Converts disk formats ● Enables VirtIO drivers (If needed) – Network, torage ● Fixes boot'loader ● ,roduces full oVirt-compatible OVF ● Outputs the VM in oVirt's export domain KVM Forum, August 2015 Drawbacks ● Slow ● Tedious ● Error-prone ● 5equires separate installation ● Do not support conversion of OVA 7les ● Error handlin& KVM Forum, August 2015 Our goal Improve the conversion process to oVirt – Faster – Tools are availa1le – Graphical user interface ● To con7&ure ● To monitor/cancel – Ro1ust – Support conversion of OVA files KVM Forum, August 2015 Design principles ● 8se virt-v9v capabilities – For &uest-level operations ● oVirt mana&es the conversion – -on7&ure conversion properties
    [Show full text]
  • Ovirt at Leeds Beckett University
    oVirt at Leeds Beckett University Using oVirt to provide a FOSS VDI solution to teach cyber security in a sandboxed realistic environment to remote students oVirt at Leeds Beckett University Paul Staniforth [email protected] Leeds Beckett University Leeds Polytechnic Leeds Metropolitan University Leeds Beckett University Previous teaching provision ● PC network workstations. ● 3 labs 25 PCs. ● Scripted imaging system (IMS). Why oVirt? ● Looking for a managed KVM solution. ● Free and Open Source Software. ● Open SDK and API. ● JAVA PYTHON RUBY Web. ● Community Support with option a vendor support. ● Scalable and Manageable. First Stages ● POC based on PC Workstations. ● Test Class with feedback session from students. ● Planned integration into course modules. Original Setup ● 1 Datacenter ● 1 Cluster ● 3 Hosts Resource Usage Upgrades to system ● 1 Datacenter ● 1 Cluster ● 3 Hosts + Increase Memory ● 4 Extra Hosts ● 8 more Hosts Security Courses ● Originally running on IMS machine. ● VMware Player. ● VirtualBox. ● Most Now moved to oVirt. Advantages with the oVirt System ● On premises there was a time penalty running VMs on physical machines. ● More flexible approach and quicker to roll out updates and changes. ● Less maintenance needed by the students. ● Can access the VMs remotely and on site. ● Staff can provide teaching support to students remotely. ● Extra flexiblility with group working. Networking for Security ● We separate the oVirt service networking and the VM networking for students. ● We have an air-gapped switch for student VM networks. ● Access outside the isolated networks is via a proxy. Remote Access for Students ● For student use they require web access to the portal really only https: ● And access to the console ports on the oVirt hosts.
    [Show full text]
  • Setting up C Programming Environment Before You Start
    Setting up C Programming Environment Before you start.. ! Please note that this is “NOT” a required part of the course and is not a homework. ! This manual is written for someone who has never programmed / never used Linux before. If you have background knowledge, you can ignore this. ! If you have any questions, please email Yoonji Shin [email protected] ! Don’t be scared, programming is fun! Enjoy :) Install VirtualBox 1. Visit http://www.virtualbox.org/wiki/downloads 2. Download VirtualBox platform packages for your OS 3. Open the Installation Package by double clicking MAC PC Install VirtualBox 4. Click continue and finish installing VirtualBox MAC PC 5. When finished installation, close the window. Download Linux 1. Visit the page http://www.ubuntu.com/download/ubuntu/download 2. Choose the Latest version of Ubuntu and 32-bit and click “Start Download” CLICK Install Linux using Virtual Box 1. Run VirtualBox by double-clicking the icon 2. Click “New” button on the top left corner MAC PC Install Linux using Virtual Box 3. Click “Continue” on the pop-up window 4. Type VM name, select “Linux” for the OS and choose “Ubuntu” for the version. MAC PC Install Linux using Virtual Box 5. Choose the amount of memory to allocate (I suggest choosing between 512 MB to 1024 MB) 6. Click Continue or Next MAC PC Install Linux using Virtual Box 7. Choose create a new virtual hard disk 8. Click Continue or Next MAC PC Install Linux using Virtual Box 9. Choose VDI (VirtualBox Disk Image) 10. Click Continue or Next MAC PC Install Linux using Virtual Box 11.
    [Show full text]
  • Oracle VM Virtualbox User Manual
    Oracle VM VirtualBox R User Manual Version 5.1.4 c 2004-2016 Oracle Corporation http://www.virtualbox.org Contents 1 First steps 11 1.1 Why is virtualization useful?............................. 12 1.2 Some terminology................................... 12 1.3 Features overview................................... 13 1.4 Supported host operating systems.......................... 15 1.5 Installing VirtualBox and extension packs...................... 16 1.6 Starting VirtualBox.................................. 17 1.7 Creating your first virtual machine......................... 18 1.8 Running your virtual machine............................ 21 1.8.1 Starting a new VM for the first time.................... 21 1.8.2 Capturing and releasing keyboard and mouse.............. 22 1.8.3 Typing special characters.......................... 23 1.8.4 Changing removable media......................... 24 1.8.5 Resizing the machine’s window...................... 24 1.8.6 Saving the state of the machine...................... 25 1.9 Using VM groups................................... 26 1.10 Snapshots....................................... 26 1.10.1 Taking, restoring and deleting snapshots................. 27 1.10.2 Snapshot contents.............................. 28 1.11 Virtual machine configuration............................ 29 1.12 Removing virtual machines.............................. 30 1.13 Cloning virtual machines............................... 30 1.14 Importing and exporting virtual machines..................... 31 1.15 Global Settings...................................
    [Show full text]
  • QEMU As a Platform for PLC Virtualization an Analysis from a Cyber Security Perspective
    QEMU as a platform for PLC virtualization An analysis from a cyber security perspective HANNES HOLM, MATS PERSSON FOI Swedish Defence Research Agency Phone: +46 8 555 030 00 www.foi.se FOI-R--4576--SE SE-164 90 Stockholm Fax: +46 8 555 031 00 ISSN 1650-1942 April 2018 Hannes Holm, Mats Persson QEMU as a platform for PLC virtualization An analysis from a cyber security perspective Bild/Cover: Hannes Holm FOI-R--4576--SE Titel QEMU as a platform for PLC virtualization Title Virtualisering av PLC:er med QEMU Rapportnr/Report no FOI-R--4576--SE Månad/Month April Utgivningsår/Year 2018 Antal sidor/Pages 36 ISSN 1650-1942 Kund/Customer MSB Forskningsområde 4. Informationssäkerhet och kommunikation FoT-område Projektnr/Project no E72086 Godkänd av/Approved by Christian Jönsson Ansvarig avdelning Ledningssytem Detta verk är skyddat enligt lagen (1960:729) om upphovsrätt till litterära och konstnärliga verk, vilket bl.a. innebär att citering är tillåten i enlighet med vad som anges i 22 § i nämnd lag. För att använda verket på ett sätt som inte medges direkt av svensk lag krävs särskild överenskommelse. This work is protected by the Swedish Act on Copyright in Literary and Artistic Works (1960:729). Citation is permitted in accordance with article 22 in said act. Any form of use that goes beyond what is permitted by Swedish copyright law, requires the written permission of FOI. FOI-R--4576--SE Sammanfattning IT-säkerhetsutvärderingar är ofta svåra att genomföra inom operativa industriella informations- och styrsystem (ICS) då de medför risk för avbrott, vilket kan få mycket stor konsekvens om tjänsten som ett system realiserar är samhällskritisk.
    [Show full text]
  • Promiscuous Mode Detection Platform
    Promiscuous Mode Detection Platform Zouheir Trabelsi and Hamza Rahmani College of Telecommunications The University of Tunisia Cité Technologique des Communications Route de Raoued Km 3,5 – 2083 El Ghazala, Ariana, Tunisia Abstract. Among various types of attacks on an Ethernet network, “sniffing attack” is probably one of the most difficult attacks to handle. Sniffers are programs that allow a host to capture any packets in an Ethernet network, by putting the host’s Network Interface Card (NIC) into the promiscuous mode. When a host’s NIC is in the normal mode, it captures only the packets sent to the host. Since many basic services, such as FTP, Telnet and SMTP, send passwords and data in clear text in the packets, sniffers can be used by hackers to capture passwords and confidential data. A number of anti-sniffers have been developed, such as PMD [18], PromiScan [17] and L0pht AntiSniff [19]. An anti-sniffer is a program that tries to detect the hosts running sniffers, in a Local Area Network (LAN). Current anti-sniffers are mainly based on three detection techniques, namely: the ARP detection, the DNS detection, and the RTT (Round Trip Time) detection techniques [13 and 16]. However, sniffers are becoming very advanced so that anti-sniffers are unable to detect them. The main drawback of these detection techniques is that they rely on the ARP, ICMP and/or DNS reply messages generated by the sniffing hosts. Therefore, in order to stay undetectable by anti-sniffers, advanced sniffers do not generate such reply messages while sniffing. This paper discusses an anti-sniffer based on a new detection technique.
    [Show full text]