nerdculture.de is one of the many independent Mastodon servers you can use to participate in the fediverse.
Be excellent to each other, live humanism, no nazis, no hate speech. Not only for nerds, but the domain is somewhat cool. ;) No bots in general. Languages: DE, EN, FR, NL, ES, IT

Administered by:

Server stats:

1.2K
active users

#hypervisor

0 posts0 participants0 posts today
gyptazy<p>What do you miss in <a href="https://mastodon.gyptazy.com/tags/Proxmox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Proxmox</span></a> or <a href="https://mastodon.gyptazy.com/tags/XCPng" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>XCPng</span></a>? </p><p>My customers often told me, that when migrating from <a href="https://mastodon.gyptazy.com/tags/VMware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VMware</span></a> based setups, they would miss something like <a href="https://mastodon.gyptazy.com/tags/DRS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DRS</span></a>. As a result I published <a href="https://mastodon.gyptazy.com/tags/ProxLB" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ProxLB</span></a> as a load balancer. Now, I do the same for <a href="https://mastodon.gyptazy.com/tags/DPM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DPM</span></a> and also some other things. What do you miss or what stops you or your business from switching to Proxmox or XCPng?</p><p><a href="https://mastodon.gyptazy.com/tags/virtualization" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>virtualization</span></a> <a href="https://mastodon.gyptazy.com/tags/hypervisor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hypervisor</span></a> <a href="https://mastodon.gyptazy.com/tags/cloud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloud</span></a> <a href="https://mastodon.gyptazy.com/tags/vms" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vms</span></a> <a href="https://mastodon.gyptazy.com/tags/homelab" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>homelab</span></a> <a href="https://mastodon.gyptazy.com/tags/features" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>features</span></a> <a href="https://mastodon.gyptazy.com/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a> <a href="https://mastodon.gyptazy.com/tags/coding" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>coding</span></a></p>
Alexandre Borges<p>To date, I have published 15 articles (1045 pages) with the strict goal of helping the cybersecurity community.</p><p>ERS (439 pages, so far): </p><p>[+] ERS 05: <a href="https://exploitreversing.com/2025/03/12/exploiting-reversing-er-series-article-05/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2025/03/1</span><span class="invisible">2/exploiting-reversing-er-series-article-05/</span></a><br>[+] ERS 04: <a href="https://exploitreversing.com/2025/02/04/exploiting-reversing-er-series-article-04/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2025/02/0</span><span class="invisible">4/exploiting-reversing-er-series-article-04/</span></a><br>[+] ERS 03: <a href="https://exploitreversing.com/2025/01/22/exploiting-reversing-er-series-article-03/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2025/01/2</span><span class="invisible">2/exploiting-reversing-er-series-article-03/</span></a><br>[+] ERS 02: <a href="https://exploitreversing.com/2024/01/03/exploiting-reversing-er-series-article-02/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2024/01/0</span><span class="invisible">3/exploiting-reversing-er-series-article-02/</span></a><br>[+] ERS 01: <a href="https://exploitreversing.com/2023/04/11/exploiting-reversing-er-series/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2023/04/1</span><span class="invisible">1/exploiting-reversing-er-series/</span></a></p><p>MAS (606 pages -- finished): </p><p>[+] MAS 10: <a href="https://exploitreversing.com/2025/01/15/malware-analysis-series-mas-article-10/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2025/01/1</span><span class="invisible">5/malware-analysis-series-mas-article-10/</span></a><br>[+] MAS 09: <a href="https://exploitreversing.com/2025/01/08/malware-analysis-series-mas-article-09/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2025/01/0</span><span class="invisible">8/malware-analysis-series-mas-article-09/</span></a><br>[+] MAS 09: <a href="https://exploitreversing.com/2024/08/07/malware-analysis-series-mas-article-08/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2024/08/0</span><span class="invisible">7/malware-analysis-series-mas-article-08/</span></a><br>[+] MAS 07: <a href="https://exploitreversing.com/2023/01/05/malware-analysis-series-mas-article-7/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2023/01/0</span><span class="invisible">5/malware-analysis-series-mas-article-7/</span></a><br>[+] MAS 06: <a href="https://exploitreversing.com/2022/11/24/malware-analysis-series-mas-article-6/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2022/11/2</span><span class="invisible">4/malware-analysis-series-mas-article-6/</span></a><br>[+] MAS 05: <a href="https://exploitreversing.com/2022/09/14/malware-analysis-series-mas-article-5/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2022/09/1</span><span class="invisible">4/malware-analysis-series-mas-article-5/</span></a><br>[+] MAS 04: <a href="https://exploitreversing.com/2022/05/12/malware-analysis-series-mas-article-4/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2022/05/1</span><span class="invisible">2/malware-analysis-series-mas-article-4/</span></a><br>[+] MAS 03: <a href="https://exploitreversing.com/2022/05/05/malware-analysis-series-mas-article-3/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2022/05/0</span><span class="invisible">5/malware-analysis-series-mas-article-3/</span></a><br>[+] MAS 02: <a href="https://exploitreversing.com/2022/02/03/malware-analysis-series-mas-article-2/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2022/02/0</span><span class="invisible">3/malware-analysis-series-mas-article-2/</span></a><br>[+] MAS 01: <a href="https://exploitreversing.com/2021/12/03/malware-analysis-series-mas-article-1/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2021/12/0</span><span class="invisible">3/malware-analysis-series-mas-article-1/</span></a></p><p>The blog home page is: <a href="https://exploitreversing.com/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">exploitreversing.com/</span><span class="invisible"></span></a></p><p>I will be back in a few months with the next articles in the Exploiting Reversing series, which will focus on vulnerability and exploitation, once I have laid all the necessary groundwork. I'm currently taking a break from writing to focus on research.</p><p>Enjoy reading and have an excellent day.</p><p><a href="https://infosec.exchange/tags/windows" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>windows</span></a> <a href="https://infosec.exchange/tags/iOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iOS</span></a> <a href="https://infosec.exchange/tags/macOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>macOS</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/chrome" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>chrome</span></a> <a href="https://infosec.exchange/tags/kernel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>kernel</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> <a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reverseengineering</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a> <a href="https://infosec.exchange/tags/research" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>research</span></a> <a href="https://infosec.exchange/tags/hypervisor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hypervisor</span></a></p>
st1nger :unverified: 🏴‍☠️ :linux: :freebsd:<p><a href="https://infosec.exchange/tags/Xbox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Xbox</span></a> 360 modders have discovered a new way to get homebrew apps and games running on the console. A new software-only exploit known as <a href="https://infosec.exchange/tags/BadUpdate" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BadUpdate</span></a> allows you to use a <a href="https://infosec.exchange/tags/USB" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>USB</span></a> key to hack past <a href="https://infosec.exchange/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> <a href="https://infosec.exchange/tags/Hypervisor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hypervisor</span></a> protections and run unsigned <a href="https://infosec.exchange/tags/code" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>code</span></a> and <a href="https://infosec.exchange/tags/games" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>games</span></a> <a href="https://github.com/grimdoomer/Xbox360BadUpdate" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/grimdoomer/Xbox360B</span><span class="invisible">adUpdate</span></a></p>
Alexandre Borges<p>The fifth article (57 pages) of the Exploiting Reversing Series (ERS) is available on:</p><p><a href="https://exploitreversing.com/2025/03/12/exploiting-reversing-er-series-article-05/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2025/03/1</span><span class="invisible">2/exploiting-reversing-er-series-article-05/</span></a></p><p>I would like to thank Ilfak Guilfanov @ilfak and Hex-Rays SA @HexRaysSA for their constant and uninterrupted support, which have helped me write these articles. </p><p>I hope you enjoy reading it and have an excellent day.</p><p><a href="https://mastodon.social/tags/hypervisor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hypervisor</span></a> <a href="https://mastodon.social/tags/hyperv" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hyperv</span></a> <a href="https://mastodon.social/tags/architecture" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>architecture</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/research" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>research</span></a> <a href="https://mastodon.social/tags/internals" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>internals</span></a> <a href="https://mastodon.social/tags/idapro" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>idapro</span></a> <a href="https://mastodon.social/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>informationsecurity</span></a> <a href="https://mastodon.social/tags/microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>microsoft</span></a></p>
MetalSamurai<p><strong>Installing XCP-NG on Apple&nbsp;Hardware</strong></p><p><a href="https://xcp-ng.org/" rel="nofollow noopener noreferrer" target="_blank">XCP-NG</a> is an open source hypervisor platform; an operating system and tools to run virtual machines on a pool of computers, with a powerful web-based management interface. The hypervisor is based on <a href="https://xenproject.org" rel="nofollow noopener noreferrer" target="_blank">Xen</a>, with extensions to allow it to be managed by a CLI or the <a href="https://xen-orchestra.com/#!/xo-home" rel="nofollow noopener noreferrer" target="_blank">XenOrchestra</a> web UI. If you’re familiar with VMware ESXi you’ll pick up XCP-NG very quickly.</p><p>XCP-NG will run on most x86 hardware, including those older Intel Apple computers you may have lying about that can be repurposed to set up a home lab or similar.</p><p>However, getting XCP-NG (either of the two long term supported versions 8.2.1 or the newer 8.3) installed and running may cause you problems, as the installer will always finish with what appears to be a fatal error. Typically it’s something like:</p> <pre>An unrecoverable error has occurred. The error was:Failed to run efibootmgr: Could not prepare Boot variable: No such file or directory</pre> <p>Not encouraging, right? But don’t worry, we can fix this. There are four steps to recover and get everything running the way it should be. But some serious things have failed that could leave you scratching your head: that root password you set during installation? Gone. The storage space for VMs you configured? Not there. Timezone and keyboard preferences? Forgotten.</p><p>First, shut down the computer and disconnect the installation USB. You won’t need it again, and having an extra disk attached might cause confusion. Then, switch on the computer and get ready with your finger hovering over the “e” key on your keyboard. As soon as the Grub loader menu appears, hit “e” and start using the cursor keys to move through the boot argument string. Look for “ro”; change that to “rw init=/sysroot/bin/sh”. What does that do? Instead of booting with the root partition in read-only mode, we’re going to mount it read-write (so we can make changes) and instead of running init to start the usual boot sequence, we’re just going to drop straight into a command shell. Hit C-x to save and continue booting.</p><p>When you get to the root shell prompt “#”, type the following commands:</p><pre><code>chroot /sysrootpasswd</code></pre><p>The first changes the environment for later commands to use the /sysroot jail, so that commands, shared libraries etc. can all be found. If you get strange errors that libc.so can’t be found, you forgot this step. The second lets us set the root password. Enter it twice, make a note of it and remember this process if you ever forget the root password again and need to reset it.</p><p>The usual commands to reboot won’t work as they talk to init, but there’s no init process running, just our shell. You might find Ctrl-Alt-Del lets you reboot; I usually resort to the power switch at this point. Turn it off and back on again. This time, let it boot up normally until you see the console screen:</p><p>Use the arrow keys, Enter and Escape to navigate the menus. Check the Network and Management Interface details are correct, if they are, you can probably ssh in if that’s more convenient. If you need to make changes you’ll be prompted for the root password you just set.</p><p>Next go to Keyboard and Timezone and pick the correct keyboard layout and timezone from the drop down lists.</p><p>The final problem is the trickiest bit. The system needs at least one SR (storage repository) to store VMs in. You probably remember during the installation phase being asked if you wanted it for thin provisioning (ext) or thick provisioning1. Without that, you’re a bit stuck, as you can’t set up any VMs, and the best way to manage XCP-NG is through XenOrchestra (usually XOA – the XenOrchestra Appliance), which you’d normally provision as the first VM on your server. You can create the missing SR(s) from the command line, by <a href="https://docs.xcp-ng.org/storage/" rel="nofollow noopener noreferrer" target="_blank">following the XCP-NG documentation.</a> I did that once, years ago, and I didn’t take any notes. It’s not hard, just tedious and you’ll probably want to ssh in from another computer so you can copy and paste all the long UUID strings.</p><p>XenOrchestra is often deployed as the XOA appliance, but it’s just a web application and there’s a handy script to download the community edition sources and build it here: <a href="https://github.com/Jarli01/xenorchestra_installer" rel="nofollow noopener noreferrer" target="_blank">https://github.com/Jarli01/xenorchestra_installer</a></p><p>You’ll need a pre-existing x86 Debian/Ubuntu machine somewhere. If you don’t have one of those already, but you’ve got a new Apple Silicon Mac, you can install <a href="https://mac.getutm.app" rel="nofollow noopener noreferrer" target="_blank">UTM</a> and set up a Debian VM there. Just download a Debian or Ubuntu image from the Gallery, then follow the instructions for building XenOrchestra Community Edition above. I don’t think it works reliably on ARM/Apple Silicon yet, so you’ll need an Intel VM, hence using UTM.</p><p>One of the great things about XO is you can have multiple installations all talking to the same pool of hypervisor hosts, and can manage them from anywhere. It’s always useful to have a spare XO somewhere to let you manage your pool, so even though this XenOrchestra installation is a temporary bootstrapping step, I’d recommend keeping it around in case you ever need it again.</p><p>Log in to your new XenOrchestra web application, using the IP address of the computer you installed it on. The default login is “admin@admin.net” and the password is “admin”, you’ll want to change both of those at some point, but don’t worry about it just now.</p><p>Look down the list of options down the left hand side until you find “New”, and choose “Server” from the menu. Fill in the boxes – Label is the name you gave your server, but it can be anything meaningful. The address is the IP address of your server, username is “root” and the password is the root password you set above. Hit Connect, then approve the connection with the self-signed certificate. You can now manage your XCP-NG server easily.</p><p>Next go back to New and this time choose Storage. From here we are going to create the missing SR(s). Choose your Host from the pop-up list at the top, give your SR a name (eg “Primary” or literally anything meaningful – don’t worry too much about names for things in XCP-NG, they’re only for your benefit, underneath the system uses UUIDs, so you can rename everything at any time). Give the SR a description, again this is just extra information for you, so “Storage for VMs” will do. Choose the storage type; I recommend EXT for now, you can experiment with the other types later, then put in the device name to use.</p><p>If your Mac had only one internal drive the device is very likely “/dev/sda3”, but you should probably check. Log in to your server, either on the console or via ssh and use parted to check the partitions. One of them should be a very large unused one that uses up the rest of the disk. The installer usually leaves that as partition 3. If your Mac had multiple drives you’ll need to check whether you installed on sda or sdb. If your Mac had a Fusion drive (with a combined HDD and SSD) and you installed on the smaller, faster SSD, it’s probably sdb.</p><p>Click the Create button, and wait a minute. If you had a second internal drive, go back and repeat the process above for that other drive. You can just use the whole drive so “/dev/sda” or “/dev/sdb” will work.</p><p>You’ve now got a fully functional XCP-NG installation. Maybe go to Home / Pools / Patches and install any missing patches, followed by a restart before you start setting up VMs, then just follow Vates’ documentation to install an XOA appliance on your server and start setting up other VMs, access to any NFS or SMB shares you’ll be using to store installation ISOs or backups and set up your backup policy.</p><ol><li>With Thin Provisioning, VMs take up as much space on disk as they are actually using, so virtual hard disks will grow as they fill up. With Thick Provisioning all the space allocated for a virtual hard disk is reserved in one go. Thin provisioning lets you pack more VMs on and makes them way more efficient to copy and move around. Thick provisioning stops VMs from growing and filling up space unexpectedly and is better suited to remote virtual disk storage solutions such as iSCSI, where you’re probably using a SAN. ↩︎</li></ol><p><span></span></p><p><a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://metalsamurai.wordpress.com/tag/apple/" target="_blank">#Apple</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://metalsamurai.wordpress.com/tag/hypervisor/" target="_blank">#Hypervisor</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://metalsamurai.wordpress.com/tag/utm/" target="_blank">#UTM</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://metalsamurai.wordpress.com/tag/vm/" target="_blank">#VM</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://metalsamurai.wordpress.com/tag/xcp-ng/" target="_blank">#XCPNG</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://metalsamurai.wordpress.com/tag/xenorchestra/" target="_blank">#XenOrchestra</a></p>
Alex<p>I'm currently looking for people with low level <a href="https://mastodon.org.uk/tags/firmware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firmware</span></a>, <a href="https://mastodon.org.uk/tags/hypervisor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hypervisor</span></a> and/or <a href="https://mastodon.org.uk/tags/virtio" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>virtio</span></a> experience. Flexible contract or full time possibility. My DMs are open for CVs, ideally with pointers to <a href="https://mastodon.org.uk/tags/upstream" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>upstream</span></a> contributions. <a href="https://mastodon.org.uk/tags/getfedihired" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>getfedihired</span></a> <a href="https://mastodon.org.uk/tags/fedihire" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fedihire</span></a> <a href="https://mastodon.org.uk/tags/jobs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>jobs</span></a></p>
Linuxiac<p>Xen 4.20 open-source type-1 hypervisor brings Arm LLC coloring, AMD Zen 5 support, Intel EPT Paging-Write, and more.<br><a href="https://linuxiac.com/xen-4-20-hypervisor-brings-amd-zen-5-support/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">linuxiac.com/xen-4-20-hypervis</span><span class="invisible">or-brings-amd-zen-5-support/</span></a></p><p><a href="https://mastodon.social/tags/xen" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>xen</span></a> <a href="https://mastodon.social/tags/hypervisor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hypervisor</span></a> <a href="https://mastodon.social/tags/virtualization" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>virtualization</span></a></p>
Alexandre Borges<p>Hacking the Xbox 360 Hypervisor: </p><p>01. Hacking the Xbox 360 Hypervisor Part 1: System Overview: <a href="https://icode4.coffee/?p=1047" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">icode4.coffee/?p=1047</span><span class="invisible"></span></a></p><p>02. Hacking the Xbox 360 Hypervisor Part 2: The Bad Update Exploit: <a href="https://icode4.coffee/?p=1081" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">icode4.coffee/?p=1081</span><span class="invisible"></span></a></p><p><a href="https://mastodon.social/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://mastodon.social/tags/exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploit</span></a> <a href="https://mastodon.social/tags/exploitation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploitation</span></a> <a href="https://mastodon.social/tags/xbox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>xbox</span></a> <a href="https://mastodon.social/tags/reversing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reversing</span></a> <a href="https://mastodon.social/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>informationsecurity</span></a> <a href="https://mastodon.social/tags/hardware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hardware</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/hypervisor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hypervisor</span></a></p>
Alexandre Borges<p>Hacking the Xbox 360 Hypervisor: </p><p>01. Hacking the Xbox 360 Hypervisor Part 1: System Overview: <a href="https://icode4.coffee/?p=1047" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">icode4.coffee/?p=1047</span><span class="invisible"></span></a></p><p>02. Hacking the Xbox 360 Hypervisor Part 2: The Bad Update Exploit: <a href="https://icode4.coffee/?p=1081" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">icode4.coffee/?p=1081</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploit</span></a> <a href="https://infosec.exchange/tags/exploitation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploitation</span></a> <a href="https://infosec.exchange/tags/xbox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>xbox</span></a> <a href="https://infosec.exchange/tags/reversing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reversing</span></a> <a href="https://infosec.exchange/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>informationsecurity</span></a> <a href="https://infosec.exchange/tags/hardware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hardware</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/hypervisor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hypervisor</span></a></p>
Francis 🏴‍☠️ Gulotta<p>Low Latency (&lt;2ms) process execution in a VM via a hypervisor, not a sandbox!?</p><p>I'm not going to pretend to understand all the limitations of a sandbox but I believe that we have solid hypervisors.</p><p><a href="https://opensource.microsoft.com/blog/2024/11/07/introducing-hyperlight-virtual-machine-based-security-for-functions-at-scale/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">opensource.microsoft.com/blog/</span><span class="invisible">2024/11/07/introducing-hyperlight-virtual-machine-based-security-for-functions-at-scale/</span></a></p><p><a href="https://toot.cafe/tags/wasm" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wasm</span></a> <a href="https://toot.cafe/tags/rust" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>rust</span></a> <a href="https://toot.cafe/tags/hypervisor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hypervisor</span></a> <a href="https://toot.cafe/tags/serverless" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>serverless</span></a> <a href="https://toot.cafe/tags/functions" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>functions</span></a></p>
chribonn<p>What you need to do to download VMWare Fusion and Workstation for free.</p><p><a href="https://youtu.be/ol0gPsxOOZo" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/ol0gPsxOOZo</span><span class="invisible"></span></a></p><p><a href="https://twit.social/tags/VMWare" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VMWare</span></a> <a href="https://twit.social/tags/Workstation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Workstation</span></a> <a href="https://twit.social/tags/WorkStationPro" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WorkStationPro</span></a> <a href="https://twit.social/tags/Fusion" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Fusion</span></a> <a href="https://twit.social/tags/Broadcom" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Broadcom</span></a> <a href="https://twit.social/tags/Download" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Download</span></a> <a href="https://twit.social/tags/software" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>software</span></a> <a href="https://twit.social/tags/FreeSoftware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FreeSoftware</span></a> <a href="https://twit.social/tags/Hypervisor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hypervisor</span></a> <a href="https://twit.social/tags/virtualmachine" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>virtualmachine</span></a> <a href="https://twit.social/tags/TTMO" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TTMO</span></a></p>
buheratorHyperlight is a library for creating micro virtual machines — or sandboxes — specifically optimized for securely running untrusted code with minimal impact. <br><br><a href="https://github.com/hyperlight-dev/hyperlight" rel="nofollow noopener noreferrer" target="_blank">https://github.com/hyperlight-dev/hyperlight</a><br><br>It supports both Windows and Linux, utilizing Windows Hypervisor Platform on Windows, and either Microsoft Hypervisor (mshv) or KVM on Linux.<br><br><a class="hashtag" href="https://infosec.place/tag/hypervisor" rel="nofollow noopener noreferrer" target="_blank">#hypervisor</a> <a class="hashtag" href="https://infosec.place/tag/virtualization" rel="nofollow noopener noreferrer" target="_blank">#virtualization</a>
vermaden<p>Added 𝗨𝗣𝗗𝗔𝗧𝗘 𝟯 [UPDATE 3] to 𝗙𝗿𝗲𝗲𝗕𝗦𝗗 𝗕𝗵𝘆𝘃𝗲 𝗩𝗶𝗿𝘁𝘂𝗮𝗹𝗶𝘇𝗮𝘁𝗶𝗼𝗻 [FreeBSD Bhyve Virtualization] article.</p><p><a href="https://vermaden.wordpress.com/2023/08/18/freebsd-bhyve-virtualization/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">vermaden.wordpress.com/2023/08</span><span class="invisible">/18/freebsd-bhyve-virtualization/</span></a></p><p><a href="https://mastodon.bsd.cafe/tags/verblog" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>verblog</span></a> <a href="https://mastodon.bsd.cafe/tags/freebsd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>freebsd</span></a> <a href="https://mastodon.bsd.cafe/tags/bhyve" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bhyve</span></a> <a href="https://mastodon.bsd.cafe/tags/virtualization" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>virtualization</span></a> <a href="https://mastodon.bsd.cafe/tags/hypervisor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hypervisor</span></a> <a href="https://mastodon.bsd.cafe/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a> <a href="https://mastodon.bsd.cafe/tags/windows" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>windows</span></a> <a href="https://mastodon.bsd.cafe/tags/uefi" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>uefi</span></a> <a href="https://mastodon.bsd.cafe/tags/grub" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>grub</span></a> <a href="https://mastodon.bsd.cafe/tags/x11" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>x11</span></a> <a href="https://mastodon.bsd.cafe/tags/uefi" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>uefi</span></a> <a href="https://mastodon.bsd.cafe/tags/bios" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bios</span></a></p>
Mikael Hansson<p>Fixed another thing in my <a href="https://hachyderm.io/tags/homelab" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>homelab</span></a> that I’ve been putting off for too long: Migrated the <a href="https://hachyderm.io/tags/TimeMachine" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TimeMachine</span></a> server from my client network to a server VLAN thanks to the <a href="https://hachyderm.io/tags/mDNS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mDNS</span></a> reflector service in my <a href="https://hachyderm.io/tags/OPNsense" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OPNsense</span></a> router.</p><p>Incidentally this also resolved an <a href="https://hachyderm.io/tags/IPv6" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IPv6</span></a> routing issue I had with my main <a href="https://hachyderm.io/tags/KVM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>KVM</span></a> <a href="https://hachyderm.io/tags/hypervisor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hypervisor</span></a>: I was unable to make its client network bridge *not* take an IPv6 address, and so when I connected to the host from my laptop, after a number of seconds the connection simply froze. Now that TimeMachine doesn’t need to be in that network anymore, I could remove that extraneous bridge interface and confirm that ssh sessions to the physical server work flawlessly over IPv6 again.</p>
HoldMyType<p>primary issue that hinders <a href="https://mathstodon.xyz/tags/virtualization" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>virtualization</span></a> on <a href="https://mathstodon.xyz/tags/ARM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ARM</span></a> is the way sensitive instructions of its ISA are executed. Sensitive instructions<br>are a class of instructions in the ISA that can change the mode of operation of the processor<br>or access specific information regarding the state of various hardware resources in the system.<br>Such instructions thus have the capability of superseding the <a href="https://mathstodon.xyz/tags/hypervisor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hypervisor</span></a><br>KVM/ARM manages the shadow page tables in the host<br>kernel. These tables map the guest virtual addresses to actual physical addresses to speed up<br>the translation. Figure 4.4 also illustrates the concept of shadow tables. KVM/ARM establishes<br>this mapping on demand. Changes in the guest virtual page table must be accurately mapped<br>onto the shadow page table. This is taken care of by KVM/ARM because whenever the guest<br>changes the page table, it has to invalidate the TLB entry associated with that page. As this<br>is a privileged operation, it traps to the KVM/ARM module where appropriate changes to the<br>shadow page table are made. Every time a new mapping is created in the shadow page table<br> After this, we were able to use the<br>Android operating system on the ARM PB11MPCORE board. The keyboard was used to send<br>the control inputs and we tested various activities like launching the browser, launching other<br>pre-installed applications like the clock and the calendar. We also tested installing applications<br>using Android application installation files (.apk), which was successful.<br><a href="https://arcb.csc.ncsu.edu/~mueller/ftp/pub/mueller/theses/ramasubramanian-th.pdf" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arcb.csc.ncsu.edu/~mueller/ftp</span><span class="invisible">/pub/mueller/theses/ramasubramanian-th.pdf</span></a></p>
HoldMyType<p>A concept is tolerated inside the microkernel only if moving it outside the kernel, i.e., permitting competing implementations, would prevent the implementation of the system's required functionality<br>OKL4 μKernel 3.0, released in October 2008, was the last open-source version of OKL4 μKernel. More recent versions are closed source and based on a rewrite to support a native <a href="https://mathstodon.xyz/tags/hypervisor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hypervisor</span></a> variant named the OKL4 Microvisor. OK Labs also distributed a paravirtualized <a href="https://mathstodon.xyz/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> named OK:Linux, a descendant of Wombat, and paravirtualized versions of <a href="https://mathstodon.xyz/tags/SymbianOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SymbianOS</span></a> and <a href="https://mathstodon.xyz/tags/Android" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Android</span></a> <br>Osker, an OS written in Haskell, targeted the L4 specification; although this project focused mainly on the use of a functional programming language for OS development, not on microkernel research.[</p><p>RedoxOS is a Rust based operating system, that is also inspired by seL4, and uses a micro kernel design. <br><a href="https://mathstodon.xyz/tags/virtualization" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>virtualization</span></a></p>
HoldMyType<p>System-call ABIs might overlap and one register that is unused in one ABI might<br>be used by another. Hence, using a magic value in a specific register is not generic<br>enough. One could instruct Hedron to check one register of a hard-coded selection<br>of registers for a magic value. However, this is not generic. It might happen that<br>an application stores the magic value as part of its working set of variables in that<br>register while it performs a foreign system call. Hedron will falsely assume it is<br>a native system call in such a situation. A register-based approach is not solid<br>enough<br><a href="https://mathstodon.xyz/tags/hypervisor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hypervisor</span></a> <br><a href="https://cyberus-technology.de/pdf/2022-04-01-diplomarbeit-philipp-schuster.pdf" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cyberus-technology.de/pdf/2022</span><span class="invisible">-04-01-diplomarbeit-philipp-schuster.pdf</span></a></p>
Wulfy<p>What do you think?</p><p>I'm getting pretty close to my perfect <a href="https://infosec.exchange/tags/grafana" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>grafana</span></a> server monitor panel.</p><p>Because I'm running a <a href="https://infosec.exchange/tags/Docker" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Docker</span></a> stack<br>There is a breakdown of performance by container.<br>The CPU breakdown is nice too...<br>Especially for a <a href="https://infosec.exchange/tags/VPS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VPS</span></a> where the STEAL and IOWAIT are important because you don't want them above zero as it means the <a href="https://infosec.exchange/tags/hypervisor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hypervisor</span></a> is struggling/overloaded.</p><p>I would like to add a list of top 3-5 processes, like you get on with "top".<br>But it's not straight forward.</p><p>The idea is you have all the servers under your command cycling in a playlist.</p><p>N.B. TIL that the entropy on a VPS is only around 200 (1000 recommended) which means <a href="https://infosec.exchange/tags/encryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>encryption</span></a> on a VPS sucks.<br>Going to look into implications for <a href="https://infosec.exchange/tags/ssh" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ssh</span></a> and such later.</p><p><a href="https://infosec.exchange/tags/uptime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>uptime</span></a> <a href="https://infosec.exchange/tags/monitoring" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>monitoring</span></a> <a href="https://infosec.exchange/tags/prometheus" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>prometheus</span></a></p><p>@schenklklopfer</p><p>(You may need to download the image to see it in detail)</p>
Stefano Marinelli<p>Migrating Windows VMs From Proxmox BIOS/KVM to FreeBSD UEFI/Bhyve</p><p><a href="https://it-notes.dragas.net/2024/11/15/migrating-windows-vms-from-bios-kvm-to-uefi-bhyve/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">it-notes.dragas.net/2024/11/15</span><span class="invisible">/migrating-windows-vms-from-bios-kvm-to-uefi-bhyve/</span></a></p><p><a href="https://mastodon.bsd.cafe/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FreeBSD</span></a> <a href="https://mastodon.bsd.cafe/tags/Proxmox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Proxmox</span></a> <a href="https://mastodon.bsd.cafe/tags/Bhyve" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Bhyve</span></a> <a href="https://mastodon.bsd.cafe/tags/RunBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RunBSD</span></a> <a href="https://mastodon.bsd.cafe/tags/Virtualization" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Virtualization</span></a> <a href="https://mastodon.bsd.cafe/tags/KVM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>KVM</span></a> <a href="https://mastodon.bsd.cafe/tags/ZFS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ZFS</span></a> <a href="https://mastodon.bsd.cafe/tags/Hypervisor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hypervisor</span></a> <a href="https://mastodon.bsd.cafe/tags/OwnYourData" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OwnYourData</span></a> <a href="https://mastodon.bsd.cafe/tags/NoteHUB" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NoteHUB</span></a> <a href="https://mastodon.bsd.cafe/tags/ITNotes" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ITNotes</span></a> <a href="https://mastodon.bsd.cafe/tags/Server" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Server</span></a></p>
Benjamin Carr, Ph.D. 👨🏻‍💻🧬<p><a href="https://hachyderm.io/tags/VMware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VMware</span></a> makes a splash: <a href="https://hachyderm.io/tags/KVM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>KVM</span></a> instead of proprietary <a href="https://hachyderm.io/tags/hypervisor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hypervisor</span></a><br>At least that's what a patch submitted by VMware developer Zack Rusin, which is publicly available on the kernel mailing list, suggests. "In order for VMware products to switch to KVM on <a href="https://hachyderm.io/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a>, several changes are required to allow KVM to start or resume unmodified VMware guests," explains Rusin. <br><a href="https://www.heise.de/en/news/VMware-makes-a-splash-KVM-instead-of-proprietary-hypervisor-10001742.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/en/news/VMware-makes-</span><span class="invisible">a-splash-KVM-instead-of-proprietary-hypervisor-10001742.html</span></a></p>