R
RayLopez99
I've read below that certain rootkits will not infect a PC if that
instance is a virtual machine--they rootkit will not load on it.
Has anybody tried surfing the net while running a Virtual Machine of
Windows 7 while the OS is Windows 7? I have used VMware's free
offering but only the XP version of a VM running under Windows 7.
RL
http://go.eset.com/us/resources/white-papers/TDL3-Analysis.pdf
Detecting virtual machine environment
The rootkit dropper checks whether the rootkit is being executed in
the context of a virtual
machine. It does so by reading the local descriptor table register
(LDTR) that is used to calculate the
linear address from the segment_selectorffset pair. Microsoft
Windows operating systems don’t use a
Local Descriptor Table (LDT), so the LDTR contains zero, but many
virtual machine programs use it,
nonetheless. In this way, the rootkit can easily check whether it is
running inside virtual machine. The
following figure shows how TDL3 uses this technique to ensure that it
isn’t executed inside a virtual
machine
instance is a virtual machine--they rootkit will not load on it.
Has anybody tried surfing the net while running a Virtual Machine of
Windows 7 while the OS is Windows 7? I have used VMware's free
offering but only the XP version of a VM running under Windows 7.
RL
http://go.eset.com/us/resources/white-papers/TDL3-Analysis.pdf
Detecting virtual machine environment
The rootkit dropper checks whether the rootkit is being executed in
the context of a virtual
machine. It does so by reading the local descriptor table register
(LDTR) that is used to calculate the
linear address from the segment_selectorffset pair. Microsoft
Windows operating systems don’t use a
Local Descriptor Table (LDT), so the LDTR contains zero, but many
virtual machine programs use it,
nonetheless. In this way, the rootkit can easily check whether it is
running inside virtual machine. The
following figure shows how TDL3 uses this technique to ensure that it
isn’t executed inside a virtual
machine