1
I have a Windows XP laptop that was infected with a virus; the virus was removed but network connectivity was jacked up. I boot to Ubuntu from a USB key to move files between the system and the network.I also used the VMWare converter to convert the system in a virtual machine which I've now got running on a Windows 7 64 bit host. The vm is pretty locked down; I don't want to give it access to the network or resources on the host in case there is undiscovered malware on the system. I'd like to be able to access the guest virtual hard drive from the host and scan it; and once that's done, be able to move files out of the virtual environment from the host.
Is there a way to safely access the guest virtual hard drive from the host using VMWare Player or VirtualBox? I've got the tools installed from the guest OS under Player.
Also - is there a better way of archiving and analyzing an existing system than this method? Purpose is more to be able to have a controlled environment for diagnosing various types of malware rather than having a bit for bit identical archive of the source. I want to be able to turn on network on the guest OS and route it through a sniffer to understand how the exploits work.
To recap what I'm looking for:
1) Immediate solution to be able to access the VM hard drive just like I can access the physical system from Ubuntu running from USB drive to move files around.
2) Be able to scan the virtual drive with virus scanning tools on the host.
3) Long term, come up with a technique for safely analyzing compromized systems.
Thanks!
Thanks Wil, good to know that I can access VMDK also, but if I just wanted to be able to access the drives from Linux I could do that from within Ubuntu when I boot to it from USB. <br/>I'm not familiar with Linux based scanners targeting Windows viruses; do you have any recommendations? ClamAV comes up in a search. – dr3x – 2010-12-21T00:25:31.590
ClamAV is the only one I know of as well! – William Hilsum – 2010-12-21T01:46:24.953