The reason MalwareBytes on your host machine is able to pick up these network requests is because VirtualBox just re-routes the internet connections from guest to host via NAT bridge. To MalwareBytes on host, it would appear as if VirtualBox is requesting these network connections. However you're still screwed if you have any shared folders that are active while these malware are infecting your computer.
but would the maleware even be able to do anything on the host with those shared folders (other then copying itself into it/infecting files/delting/encrypting files in it?) Without some sort of serious security exploint in windows just having a malious file shouldn't do anything even if it's on a shared folder on the host. Actually infecting the host requires you to go to the shared folter on the host and start in yourself. Of course if windows or virtualbox has some kind of exploit that let's it run automatically your really screwed, but having a shared folder alone shoudn't be enough on it's own either, it needs some kind of exploit.
actually in a technical point of view, you are not, because access to shared folders doesnt mean the host will run these files at all. It would be dangerous only if you had some sort of startup script inside a shared folder, and the virus modified that startup script to get some sort of special acess, but that would require imbearable hacking skills to program a virus that would be smart to do so. most viruses are simple and direct.
@@TechHowYT i think this is fine because the malware cant write to it it can only read that data and any write requests the malware sends should error out, but it is best to have them completely disabled for safety.
downloading virtual machine in a virtual machine in a virtual machine in a virtual machine in a virtual machine in a virtual machine in a virtual machine makes me feel comfortable
CPU and GPU: SIUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU
It's possible for malware to infect the host if there's a bug in the hypervisor or your cpu's virtualisation extensions, howeverthese are very rare and I don't think I've ever seen one before. You're more likely to be infect due to shared folders or havint the networking enabled on the VM
@@lavie69 I've seen a lot of viruses that detect VMs and start acting innocent, or just terminate, but I've never heard of one that nukes the host machine after detecting that it's in a VM. Could you provide an example?
The temp folder CAN hold executables. Especially when using installers, because most time they are unzipping an executable inside them and in order to run them they need a file location so they get dropped into Temp. This can also happen for example when you copy an exe in WinRar, it will copy the exe to the real filesystem into Temp and then copies the path so CTRL+V can put the exe somewhere else
Kinda scary and informative because some of these things are happening on my computer so you may have just informed me of something I had no idea about😅
I mean, it's much harder for a virus to get through a VM than through anti-virus software... I'm no specialist at information security, correct me if i'm wrong, please.
Thank You, you saved my computer. I was going to install vbox and then install windows and then Install a virus but when I watched this video I immediately knew the answer. Thank you
Our teacher at school made us download a linux iso to use within virtualbox. Now the .iso file was infected, starting a virtual machine with the .iso caused it to infect the entire pc and school network. Windows defender noticed but the damage was already done.
@@YourAverageNoobOnRoblox smh no it is not. Clearly you don't know really anything about it. Though yes it might be true that actual hackers prefer Linux because it's way more safe than shitty windows
@@MScienceCat2851 you can program and hack on any OS as long as the tools are there. On Linux though it might be easier to hack as you have full control over literally everything unlike windows. And the fact Linux is way better for concealing that you are a hacker
I am so happy that I watch informative tech videos. This one especially. It taught me some things I didn't know about. So this is how hackers really get your pc to be a part of the botnet. This is really scary and now I will be even more careful than ever.
about malwarebytes blocking the "network" thing, it was because for your vm to be able to access internet, it need to go through your computer, through all of your firewall, which one of them is malwarebytes
In case you are REALLY scared, enable isolation on the host and cutoff connections in cooporation with a very good antivirus software But at the end of the day, your best protection is YOU. just dont click on sussy things.
Hello Lifeen, there is nothing to worry about. While using Vmware, your host cannot get infected. This is due, if you do not share clipboards or folders, or even your network, you will be safe. But it has small chance for infect. So thanks for this video. I am looking forward.
You just have to disable all the features. There are scripts to make it easier. I remember when Enderman got his laptop almost killed as he started a virus on his XP machine and it went through the VMWare outside into his Windows 10 defender screaming.
Even if you turn off all shared stuff. It is possible to break out of the VM and escape the hypervisor (in this case VmBox) and access the host. Tho vmware and co regulary update their software to prevent such expliots. Check out BlackHat for more info.
it depends more on your activities, because you can have shared clipboards and folders, a bridged adapter and still not get infected. But if you are behaving badly, don't be surprised by the outcome ;)
@@user-lj4lo7cx7m I said "it depends MORE", not "exclusively".. before replying to just having the reason, read "unknown user". Of course a piece of software is never flawless, but in general terms, it's quite rare these ones get attacked succesfully
If you use virtual box, you can encrypt your internet ip and port. It is like using a separate wifi for your virtual box and your host machine. If you use that opetion i don't think it will spread to the host machine.
@@InfamousKoala if i use a different wifi in guest machine. will not virus escape to that other wifi"s connected device (other than host machine)? pls reply.
Moral of the story: be MEGA carful while testing computer viruses in your vm, be sure that you use a different connection in ur vm and use a Malwarebytes in youre man host pc for protection 😉 Surf safely 😊
Thank you so much for the video! I was searching about this topic a while ago and today I found your video in my recommendations page. Just what I was searching for. This video + reading the comment section has helped me a lot to understand. Greetings from a teacher :) (Systems&Networking is not my speciality but I use this tools with my students)
POV: you have 128GB ram and you run a virtual machine inside a virtual machine inside a virtual machine inside a virtual machine inside a virtual machine inside a virtual machine inside a virtual machine inside a virtual machine inside a virtual machine inside a virtual machine inside a virtual machine inside a virtual machine inside a virtual machine inside a virtual machine inside a virtual machine inside a virtual machine inside a virtual machine inside a virtual machine inside a virtual machine inside a virtual machine inside a virtual machine inside a virtual machine inside a virtual machine inside
The correct answer to this is it depends. But if a hypervisor 0day is present then the answer is yes a skilled and aware malware dev can escape the vm. Other methods can be shared directories as mentioned. Vuln software on your host machine if they vm is not on an isolated network. But also if you have a shared clipboard via methods like clipboard hijacking files.
Actually the user account control is either saying its a verified publisher or a unknown publisher (most malware are unknown) asking administrator access and giving an option to say yes or no which you likely have if you own the pc
around 9:50 when your host's Malwarebytes sends you an alert for blocked web traffic, I'm assuming this is simply because the Virtual Machine is piggybacking off of the host's network? And essentially there is nothing to worry about, it's just the network traffic inside the virtual machine being detected which does not affect the host? Only curious if you agree, I am a novice with this stuff.
@@lifeen i have SEP (Symantec Endpoint Protection) and i always wondered why am i getting pop-ups from antivirus when i am going to sites on VM. But now i know why 🙃
Nicely stated, PSY0PZ. The VM (or hypervisor) is just another process making requests and receiving responses which have to pass through the host's security protections. Of equal concern is that when requests leave the VM (without going through a VPN) - your actual IP Address (of your router) is now known. This will invite unwanted attention from BOTS looking for open ports or port forwarding weaknesses (RDP, etc., ) on your infrastructure.
@@d4sty. I fix it by running a VPN inside my VM. This allows me to use the VPN's servers to reach sites that I'm interested in connecting to with a different IP address and if required a different region. Your ISP will still see your IP address (of your router) and the VPN provider will too but the data you're sending and receiving is encrypted (within the VPN's tunnel). Your host (the physical computer running the VM) will not be able to unencrypt the data which means any anti-malware or anti-virus software running on the host will not be triggered.
This is one of my favourite videos to watch, I don’t know what it’s called but these kind of creepy viruses and Trojan’s website videos are so interesting. Amazing video 👍🏻
I havent watched the whole video, but i feel 100% sure already that the answer is yes, even though it would be hard as it would essentially require a sandbox escape from the VM.
Very scary! Bravo to you good sir for being the testbed for our enjoyment! I think I’ll leave the virtual virus testing to more advanced folks…… for now lol
Thank you so much bro I wanted to download steamunlocked games but as soon as I saw this video I was like just get the game with real money. We can appriciate that this guy took risk of his own pc for us Thank you once again 😊
@@lifeen Hey, is it possible that you explain a bit more. I'm new to this, so I don't know anything What is sandboxie? How to download cracked software without any viruses? Do you know best websites for that?
But I always download from steam unlocked u see there are two steam unlocked website one with ads and might be fake and the other one has no ads anyway I downloaded games from steam unlocked and it has no virus
You are likely not isolating your network adapter and your VM traffic is being passed through your PC and then out to your router-modem-internet. MBAM is picking it up once it makes it to your PC.
15:54 delete all the stuff from temp. i heard that if your PC is slow, after closing all apps out, delete all files in Temp, as that is where some temporary files used in other apps are located
Virtualbox has a few convenience features like shared clipboard and drag and dropping files. You can set it to off, from only guest to host, from only host to guest, and bidirectional. Are these potential attack vectors for malware to exploit? If i keep it set to host to guest only or off would it be safer? I rarely need to ever pull anything _out_ of the guest system anyways. Usually only ever use such features to drop files _into_ the guest that I need, such as executables for example.
Bruh, once malicious website downloaded viruses in my computer, but it downloaded antivirus too. Viruses were neutralised after restart. They were just opening random websites
I recall being remotely controlled by someone on the Internet, I was a silly kid that downloaded Munecraft forceop hacks and portforwarded to get my Minecraft server on the Internet
Tip for this delete files in temp folder like delete the temp folder its for like when u turn on ur pc for first time and u need to set it up but if it gets factory reseted then it will reinstall
@Lifeen wow. With NAT, it is still possible to spread to host machine ! Can you please recommend me a malware family which works in VM environment, performs network activity but not spread on host machine ? Is it possible ? I want to capture the network traffic of this infected machine.
1:46 if you got malwarbytes installed and working, then you've got it. those crack sites either give you malware or the real deal, next to never is the real thing packaged with malware. so no dont uninstall malwarebytes if you finished the installation
So now I know why Mint virtual machines have little issue with shared folders, while Mac virtual machines are a nightmare to enable. Mint has very few viruses. Even Macs are more virus-prone!
Would the Network spread be prevented by using a VPN on the Virtual Machine? I have a Mac and am looking to do a Virtual Machine of Windows/Linux/Home Assistant.
%99 of these antivirus cracks are malwares anyway, I tested one sample in my VM, it had an icon of man throwing trash to trash bin and it was just a downloader malware which downloaded tons of malwares to the device after execution. Most of the cracks of antiviruses uses this type of malware for some reason.
dude, malwarebytes will flag any crack websites because theres not a 100% chance theyre safe + binary patching and apps with bad signatures will flag on basically all av's
Not only that but, because they are hosting cracked/pirated software and distributing it which is in violation of the terms of service of most if not all software publishers and developers.
Virus has to be coded in c++ ask request to connect direct hardware access instead of virtual. You can damage hardware to touch host software you need to know communication between virtual box to host machine os handle the request from virtual machine then. You can able to achieve possible it's really hard person should know os level programming and really good understanding of network
Just asking as someone who dose not know this kind of thing is it possible to defeat this kind of problem with 2 hardware modems or networks. One for host connections and the other for the virtual machines where you prevented the installation on the opposite. Example: Network A or Modem A software installed on Host, but not Network B or Modem B. --- Network B or Modem B software Installed on VM, but not Network A or Modem A.
If i have same folders on my usb / hardrive *Before* the virus, and than i disconnect my usb/hard drive than my computer gets infected than is my usb /hard drive safe?
No you can't. Triage by recorded future? That's a web app, runs on their server, just like any run, so what you see is just the interface. And also chrome has sandbox features like V8 sandbox, site isolation/ process isolation, enhanced safe browsing, site permissions. Maybe if you use a tool like shade or sandoxie, malware might break out(maybe)
I'll be back with more vidz. I know its 2 years later, am still studying. I've noted your requests. My personal repo: github.com/NixonSchool
hello
hi
incredible
yeaaa
hi
The reason MalwareBytes on your host machine is able to pick up these network requests is because VirtualBox just re-routes the internet connections from guest to host via NAT bridge. To MalwareBytes on host, it would appear as if VirtualBox is requesting these network connections. However you're still screwed if you have any shared folders that are active while these malware are infecting your computer.
but would the maleware even be able to do anything on the host with those shared folders (other then copying itself into it/infecting files/delting/encrypting files in it?) Without some sort of serious security exploint in windows just having a malious file shouldn't do anything even if it's on a shared folder on the host. Actually infecting the host requires you to go to the shared folter on the host and start in yourself. Of course if windows or virtualbox has some kind of exploit that let's it run automatically your really screwed, but having a shared folder alone shoudn't be enough on it's own either, it needs some kind of exploit.
actually in a technical point of view, you are not, because access to shared folders doesnt mean the host will run these files at all.
It would be dangerous only if you had some sort of startup script inside a shared folder, and the virus modified that startup script to get some sort of special acess, but that would require imbearable hacking skills to program a virus that would be smart to do so.
most viruses are simple and direct.
What if we are using something like Kasam to virtualize does it do the same ?
What if you have the shared folders set to read only within Virtual Box?
@@TechHowYT i think this is fine because the malware cant write to it it can only read that data and any write requests the malware sends should error out, but it is best to have them completely disabled for safety.
downloading virtual machine in a virtual machine in a virtual machine in a virtual machine in a virtual machine in a virtual machine in a virtual machine makes me feel comfortable
😇😁
CPU and GPU fans be like uuuuuuuuuuiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii
lmao 😂
@@akgamer3666 poor GPU bruh
CPU and GPU: SIUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU
It's possible for malware to infect the host if there's a bug in the hypervisor or your cpu's virtualisation extensions, howeverthese are very rare and I don't think I've ever seen one before.
You're more likely to be infect due to shared folders or havint the networking enabled on the VM
What if we are using something like Kasam
Some viruses detects the vm and nukes the host
@@lavie69 how would that happen?
@@dwlive732 What is kasam?
@@lavie69 I've seen a lot of viruses that detect VMs and start acting innocent, or just terminate, but I've never heard of one that nukes the host machine after detecting that it's in a VM. Could you provide an example?
I have never seen a text-to-speech youtuber with such great grammar!
Very informational video :)
💀
The temp folder CAN hold executables. Especially when using installers, because most time they are unzipping an executable inside them and in order to run them they need a file location so they get dropped into Temp. This can also happen for example when you copy an exe in WinRar, it will copy the exe to the real filesystem into Temp and then copies the path so CTRL+V can put the exe somewhere else
OHHHHHHHHHHH
dude i was so scared when i saw executables in my temo folder, thanks!
Kinda scary and informative because some of these things are happening on my computer so you may have just informed me of something I had no idea about😅
Stop downloading porn torrents in your virtual box
@@enacku lmao
@@enacku "but the shady guy on quora with no source said it was okay!!!"
@@enacku No.
@@enacku No, i don’t think i will
If you get a advanced piece of malware that can go from virtual machine to host machine malware bytes isn't going to save you.
i think you're underestimating malwarebytes.
@@leothesaviourhe certainly is
I mean, it's much harder for a virus to get through a VM than through anti-virus software... I'm no specialist at information security, correct me if i'm wrong, please.
Isn't virtual machine, aside from ricing some KDE distro or Arch within Windows, the type of "anti-virus" for when you KNOW a file is a virus?
Thank You, you saved my computer. I was going to install vbox and then install windows and then Install a virus but when I watched this video I immediately knew the answer. Thank you
Our teacher at school made us download a linux iso to use within virtualbox. Now the .iso file was infected, starting a virtual machine with the .iso caused it to infect the entire pc and school network. Windows defender noticed but the damage was already done.
bro linux is already a hacking operating system
@@YourAverageNoobOnRoblox smh no it is not. Clearly you don't know really anything about it. Though yes it might be true that actual hackers prefer Linux because it's way more safe than shitty windows
@@aleksandersats9577 ..and simple programmers a lot of the time, lol
@@aleksandersats9577 I thought hackers and programmers use linux brcause they have more control since its open source?
@@MScienceCat2851 you can program and hack on any OS as long as the tools are there. On Linux though it might be easier to hack as you have full control over literally everything unlike windows. And the fact Linux is way better for concealing that you are a hacker
I am so happy that I watch informative tech videos. This one especially. It taught me some things I didn't know about. So this is how hackers really get your pc to be a part of the botnet. This is really scary and now I will be even more careful than ever.
about malwarebytes blocking the "network" thing, it was because for your vm to be able to access internet, it need to go through your computer, through all of your firewall, which one of them is malwarebytes
In case you are REALLY scared, enable isolation on the host and cutoff connections in cooporation with a very good antivirus software
But at the end of the day, your best protection is YOU.
just dont click on sussy things.
haha yes
But what about the horny MILFs in my area?
@@wafflesncatsup5323 eat some catnip then idk
@@wafflesncatsup5323 wait wtf
@@tylern6420 meoww
Hello Lifeen, there is nothing to worry about. While using Vmware, your host cannot get infected. This is due, if you do not share clipboards or folders, or even your network, you will be safe. But it has small chance for infect. So thanks for this video. I am looking forward.
You just have to disable all the features. There are scripts to make it easier. I remember when Enderman got his laptop almost killed as he started a virus on his XP machine and it went through the VMWare outside into his Windows 10 defender screaming.
@@jonny11bonk 😁
@@jonny11bonk do you have the link to video?
Even if you turn off all shared stuff. It is possible to break out of the VM and escape the hypervisor (in this case VmBox) and access the host. Tho vmware and co regulary update their software to prevent such expliots. Check out BlackHat for more info.
@@TheFimiTube Yeah, plus there are private exploits. However, if you get infected just send the virus to VMWARE and report it.
it depends more on your activities, because you can have shared clipboards and folders, a bridged adapter and still not get infected. But if you are behaving badly, don't be surprised by the outcome ;)
Not really, there have been vulnerabilities with VirtualBox and VMware that can execute code from the guest machine to the host one
@@user-lj4lo7cx7m I said "it depends MORE", not "exclusively".. before replying to just having the reason, read "unknown user". Of course a piece of software is never flawless, but in general terms, it's quite rare these ones get attacked succesfully
@@whateverdope after you :)
bro talks like my spam folder :((((
You tell many times you cant see whats going on... And my brain just screams: TASK MANAGER
goes much deeper than videos on this topic, very interesting
If you use virtual box, you can encrypt your internet ip and port. It is like using a separate wifi for your virtual box and your host machine. If you use that opetion i don't think it will spread to the host machine.
How give me step by step instructions 😁 please.
@@sydrul8756 when you lauch your vm there is gonna be a newtork tab in the settings. There you can use different netowrk for your inbuilt vm
What do people here mean by shared files can spread malware to host?
@@Tomas-ml9nv if you share files from an infected pc, it might be shared as well
@@InfamousKoala if i use a different wifi in guest machine. will not virus escape to that other wifi"s connected device (other than host machine)? pls reply.
Yes, some malware such as ransomware can encrypt the main computer's files without file sharing set to none on a virtual machine
so the ransomware accesses the actual hardware disk?
@@alone-vf4vy, Yes. Only if file sharing is not set to none, ransomware can encrypt your main PC drive files
easy fix: open a virtual machine in a virtual machine in a virtual machine. that why you will protect your computer a protection no hack able
@@lifeen or use an ENTIRE DIFFERENT operating system for the host
@@Jack_ekrjgterbtonr good idea
I do that lmao, or i use my old laptop tha has nothing bout me, and diff wifi
The quickest way for it to get through is having a share folder on the host (shows up as a drive in the vm) it can speedrun
Is there a safe way to just turn off the VBox VM wifi while running the "virus"? Trying to test some files out
A relaxing game of trucking with hobby of trying out malware, what a chad
I know this is an unnecessary tip, but you can press down your middle mouse button on a link in your browser to open a new tab with the website.
Won't the virus just infect other users on the network the host is in?
just turn off your internet when u run the virus
@@lifeen turn off your hosts wifi
first off if network sharing is on then yes maybe, otherwise no.
Pull out your Ethernet cable on your host machine first.
idk maybe vpn
Thanks sir, for so nice n so useful programs you are giving us God Almighty bless you n your family
3:37 you can just press win+r to open run box and type appdata and enter then click local and temp (also open show hidden items)
a quicker way with the run box is to type %temp% into it.
@@SmilerRyanYT Oh yeah I forgot that
These type of videos are very interesting
Thank you for risking ur machine for this video
Moral of the story: be MEGA carful while testing computer viruses in your vm, be sure that you use a different connection in ur vm and use a Malwarebytes in youre man host pc for protection 😉
Surf safely 😊
Thank you so much for the video! I was searching about this topic a while ago and today I found your video in my recommendations page. Just what I was searching for. This video + reading the comment section has helped me a lot to understand. Greetings from a teacher :) (Systems&Networking is not my speciality but I use this tools with my students)
POV: you have 128GB ram and you run a virtual machine inside a virtual machine inside a virtual machine inside a virtual machine inside a virtual machine inside a virtual machine inside a virtual machine inside a virtual machine inside a virtual machine inside a virtual machine inside a virtual machine inside a virtual machine inside a virtual machine inside a virtual machine inside a virtual machine inside a virtual machine inside a virtual machine inside a virtual machine inside a virtual machine inside a virtual machine inside a virtual machine inside a virtual machine inside a virtual machine inside
The correct answer to this is it depends. But if a hypervisor 0day is present then the answer is yes a skilled and aware malware dev can escape the vm. Other methods can be shared directories as mentioned. Vuln software on your host machine if they vm is not on an isolated network. But also if you have a shared clipboard via methods like clipboard hijacking files.
Actually the user account control is either saying its a verified publisher or a unknown publisher (most malware are unknown) asking administrator access and giving an option to say yes or no which you likely have if you own the pc
underrated channel
around 9:50 when your host's Malwarebytes sends you an alert for blocked web traffic, I'm assuming this is simply because the Virtual Machine is piggybacking off of the host's network? And essentially there is nothing to worry about, it's just the network traffic inside the virtual machine being detected which does not affect the host? Only curious if you agree, I am a novice with this stuff.
@@lifeen i have SEP (Symantec Endpoint Protection) and i always wondered why am i getting pop-ups from antivirus when i am going to sites on VM. But now i know why 🙃
Nicely stated, PSY0PZ. The VM (or hypervisor) is just another process making requests and receiving responses which have to pass through the host's security protections. Of equal concern is that when requests leave the VM (without going through a VPN) - your actual IP Address (of your router) is now known. This will invite unwanted attention from BOTS looking for open ports or port forwarding weaknesses (RDP, etc., ) on your infrastructure.
@@laughingalien and how to fix that?
@@d4sty. I fix it by running a VPN inside my VM. This allows me to use the VPN's servers to reach sites that I'm interested in connecting to with a different IP address and if required a different region.
Your ISP will still see your IP address (of your router) and the VPN provider will too but the data you're sending and receiving is encrypted (within the VPN's tunnel). Your host (the physical computer running the VM) will not be able to unencrypt the data which means any anti-malware or anti-virus software running on the host will not be triggered.
@@laughingalienare free vpns fine too? And which one are you using if I may ask? Thanks in advance
This is one of my favourite videos to watch, I don’t know what it’s called but these kind of creepy viruses and Trojan’s website videos are so interesting. Amazing video 👍🏻
The loquendo, the Pc vibe, the virus theme. I just love it. It's so creepy and nostalgic at the same time. Damn.
@@jyj-6414 honestly yeah, its all round just creepy with all of the malware having happy icons, it gives me goosebumps
The crack background is amazing. Anyways you helped me with the cracked apps.
I havent watched the whole video, but i feel 100% sure already that the answer is yes, even though it would be hard as it would essentially require a sandbox escape from the VM.
My 18 yr old sis was so scared for this to happend, he has almost no virtual machine experience
@@bloodbonnieking lmao
@@bloodbonnieking what virtual machine does to a mf
Very scary! Bravo to you good sir for being the testbed for our enjoyment! I think I’ll leave the virtual virus testing to more advanced folks…… for now lol
Thank you so much bro I wanted to download steamunlocked games but as soon as I saw this video I was like just get the game with real money. We can appriciate that this guy took risk of his own pc for us Thank you once again 😊
@@lifeen Hey, is it possible that you explain a bit more.
I'm new to this, so I don't know anything
What is sandboxie?
How to download cracked software without any viruses?
Do you know best websites for that?
commenting for notifs
@@lifeen 🙏🙏🙏appreciate you for this man
@@lifeen you never made it
But I always download from steam unlocked u see there are two steam unlocked website one with ads and might be fake and the other one has no ads anyway I downloaded games from steam unlocked and it has no virus
It is entirely possible for that happen, but it would have to be a very smart exploit to make that happen.
You are likely not isolating your network adapter and your VM traffic is being passed through your PC and then out to your router-modem-internet. MBAM is picking it up once it makes it to your PC.
Guess what? If you give your VM network access, it can use the network to attempt to spread computer worms! Wow, who would've thought?
how do we transfer the files then, log into dropbox or something?
@@maxxseemount an iso file that contains the files you need to put
So, i left this video playing, and when I came back, this dude was just reading wikipedia? Great content, bro
15:54 delete all the stuff from temp. i heard that if your PC is slow, after closing all apps out, delete all files in Temp, as that is where some temporary files used in other apps are located
@@gh2286what
then delete as many as you can without crashing it, as viruses can be lurking therer
@@gh2286 use it while your not rinning windows. if its temporary it should be able to remake itself
i feel like this is an ad for malwarebytes lmao
A hypervisor Exploit can be exploited to infect the host machine
at another time still I appreciate all this information
Some almost facts, like the yellow banner meaning ”not safe to install” and not “not signed by paying Microsoft a bunch of money”
Virtualbox has a few convenience features like shared clipboard and drag and dropping files. You can set it to off, from only guest to host, from only host to guest, and bidirectional. Are these potential attack vectors for malware to exploit? If i keep it set to host to guest only or off would it be safer? I rarely need to ever pull anything _out_ of the guest system anyways. Usually only ever use such features to drop files _into_ the guest that I need, such as executables for example.
question would less severe viruses be tolerated and not be carried to the host?
Bruh, once malicious website downloaded viruses in my computer, but it downloaded antivirus too. Viruses were neutralised after restart. They were just opening random websites
Does your virtualbox have the network adapter configured as NAT or bridge?
very informative ! I'll watch my back and try software on a VM now :) (I did when I was suspicous but you know ; never trust computers)
They won't delete the malware after this, there are countless videos about CNET and they hadn't deleted anything.
me watching without the audio and thinking when the virus is going to break the host machine
I recall being remotely controlled by someone on the Internet, I was a silly kid that downloaded Munecraft forceop hacks and portforwarded to get my Minecraft server on the Internet
Tip for this delete files in temp folder like delete the temp folder its for like when u turn on ur pc for first time and u need to set it up but if it gets factory reseted then it will reinstall
Bitdefender plus malwarebytes plus kaspersky = god trio
@Lifeen wow. With NAT, it is still possible to spread to host machine !
Can you please recommend me a malware family which works in VM environment, performs network activity but not spread on host machine ?
Is it possible ?
I want to capture the network traffic of this infected machine.
underated youtuber looking forward to more
for some reason the text to speak voice sounds like that one analog horror voice sometimes in the video
someone of them are probably arent running cus its a vm as some are built to detect if its a vm
music is very much needed on this content 🍿 love it
What is the overall conclusion of this video?? Can the virus spread on the host machine?
Very good video, though Id like to see you voiceover/speak live instead of doing TTS, it would be more comfortable to watch
Great video and very useful. Hope you could monetize it!
Bro got nfs most wanted on his pc hes a legend
1:46 if you got malwarbytes installed and working, then you've got it. those crack sites either give you malware or the real deal, next to never is the real thing packaged with malware. so no dont uninstall malwarebytes if you finished the installation
btw to not get infected, Turn off network adpater, erase clipboard, VM Wifi then it will have 1% of spreading into host PC
way less than 1%.
People's been saying that virus protection has been killing people's computer Even my best friend said that and he's smart
Unless intel\AMD (or your CPU manufacturer) screws up very badly, no.
What if the virus was working and you just turn of the internet. Won't it stop the virus?
The malware existed way before you installed any other trojan, it is called windows
i really apreciate your help with dowloanding this software
If you turn on the internet while any virus is activated and running then it'll spread through out the devices that are connected to the same Internet
So now I know why Mint virtual machines have little issue with shared folders, while Mac virtual machines are a nightmare to enable. Mint has very few viruses. Even Macs are more virus-prone!
What if you open virtual box in virtual box and install viruses on virtual box on that virtual box?
🤣🤣
Would the Network spread be prevented by using a VPN on the Virtual Machine? I have a Mac and am looking to do a Virtual Machine of Windows/Linux/Home Assistant.
what if i do an Virtual Machine on a virtual Machine.
?
>malwarebytes blocking links to cracks of their premium software
YOU'D THINK SO RIGHT?
%99 of these antivirus cracks are malwares anyway, I tested one sample in my VM, it had an icon of man throwing trash to trash bin and it was just a downloader malware which downloaded tons of malwares to the device after execution. Most of the cracks of antiviruses uses this type of malware for some reason.
Thank You Very Much I Really Plan On Being An Upcoming Producer??
i feel like my computer is boutta get that virus lol
Iv'e been wondering if that also would happened if a virtual machine was in a virtual machine and so on and so on
dude, malwarebytes will flag any crack websites because theres not a 100% chance theyre safe + binary patching and apps with bad signatures will flag on basically all av's
Not only that but, because they are hosting cracked/pirated software and distributing it which is in violation of the terms of service of most if not all software publishers and developers.
Virus has to be coded in c++ ask request to connect direct hardware access instead of virtual. You can damage hardware to touch host software you need to know communication between virtual box to host machine os handle the request from virtual machine then. You can able to achieve possible it's really hard person should know os level programming and really good understanding of network
No
Just asking as someone who dose not know this kind of thing is it possible to defeat this kind of problem with 2 hardware modems or networks. One for host connections and the other for the virtual machines where you prevented the installation on the opposite.
Example: Network A or Modem A software installed on Host, but not Network B or Modem B.
--- Network B or Modem B software Installed on VM, but not Network A or Modem A.
Yeah I think so
This video wass much longer than it shoul've been.
yes it can, it is called a virtual machine bypass or something i forgot
If i have same folders on my usb / hardrive *Before* the virus, and than i disconnect my usb/hard drive than my computer gets infected than is my usb /hard drive safe?
Yes, the files should be safe, but some ransomwares encrypts connected folders, so if you connect it back, it might get infected too
@@lifeen okay , thanks for the answer
Am i safe to use my microsoft account for the windows operating system?
More please! Hope you get to 1k subs!
If you use something like triage, can it still infect the host system? Also, nice educational video :)
No you can't. Triage by recorded future? That's a web app, runs on their server, just like any run, so what you see is just the interface. And also chrome has sandbox features like V8 sandbox, site isolation/ process isolation, enhanced safe browsing, site permissions. Maybe if you use a tool like shade or sandoxie, malware might break out(maybe)
now run a virtual machine in a virtual machine
People like you get the video maker in trouble. The company that owns soft soft, Image Line, are very aggressive with piracy. They read
I asked this every time I was seeing a video of trying viruses in a virtual machine
That's why i hate " cracks".
So its safe to run viruses on Vbox right?
Can dual boot help me play games infected with malware on one harddisk(os) and for normal use another os harddisk