Can a virus spread from the virtual machine to host machine?

Sdílet
Vložit
  • čas přidán 25. 07. 2021
  • Malware vs virtualbox

Komentáře • 516

  • @lifeen
    @lifeen  Před rokem +50

    part 2 Linux?
    czcams.com/video/hmG66HsGk5s/video.html
    Are you interested in learning winapi, assembly, C programming and other fun stuff, visit/follow my github:
    github.com/NixonSchool
    On my community page and read on my whereabouts.
    Also, if you desire a VPN that is fast and people don't know about it, use SoftEtherVPN. Not a sponsor, just a free tool I found and I really like.
    www.vpngate.net/en/download.aspx

    • @_lun4r_
      @_lun4r_ Před rokem +1

      Don't pin your own comments ffs

    • @lifeen
      @lifeen  Před rokem +3

      @@_lun4r_ get more popcorn for the video.

    • @_lun4r_
      @_lun4r_ Před rokem +1

      @@lifeen I'll get more of it once you unpin it, + you are the one who hearts every comment

    • @Krisgetthebananana
      @Krisgetthebananana Před rokem +2

      @@_lun4r_ bruh

    • @DJH4521
      @DJH4521 Před rokem

      @@_lun4r_ stay mad lmao

  • @SriHarshaChilakapati
    @SriHarshaChilakapati Před rokem +890

    The reason MalwareBytes on your host machine is able to pick up these network requests is because VirtualBox just re-routes the internet connections from guest to host via NAT bridge. To MalwareBytes on host, it would appear as if VirtualBox is requesting these network connections. However you're still screwed if you have any shared folders that are active while these malware are infecting your computer.

    • @KeinNiemand
      @KeinNiemand Před rokem +13

      but would the maleware even be able to do anything on the host with those shared folders (other then copying itself into it/infecting files/delting/encrypting files in it?) Without some sort of serious security exploint in windows just having a malious file shouldn't do anything even if it's on a shared folder on the host. Actually infecting the host requires you to go to the shared folter on the host and start in yourself. Of course if windows or virtualbox has some kind of exploit that let's it run automatically your really screwed, but having a shared folder alone shoudn't be enough on it's own either, it needs some kind of exploit.

    • @policiacivil3867
      @policiacivil3867 Před rokem +31

      actually in a technical point of view, you are not, because access to shared folders doesnt mean the host will run these files at all.
      It would be dangerous only if you had some sort of startup script inside a shared folder, and the virus modified that startup script to get some sort of special acess, but that would require imbearable hacking skills to program a virus that would be smart to do so.
      most viruses are simple and direct.

    • @dwlive732
      @dwlive732 Před rokem

      What if we are using something like Kasam to virtualize does it do the same ?

    • @TechHowYT
      @TechHowYT Před rokem +3

      What if you have the shared folders set to read only within Virtual Box?

    • @jake_dev1046
      @jake_dev1046 Před rokem +2

      @@TechHowYT i think this is fine because the malware cant write to it it can only read that data and any write requests the malware sends should error out, but it is best to have them completely disabled for safety.

  • @iRaqhy
    @iRaqhy Před rokem +557

    downloading virtual machine in a virtual machine in a virtual machine in a virtual machine in a virtual machine in a virtual machine in a virtual machine makes me feel comfortable

    • @BanriFerdinand
      @BanriFerdinand Před rokem +10

      😇😁

    • @akgamer3666
      @akgamer3666 Před rokem +77

      CPU and GPU fans be like uuuuuuuuuuiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii

    • @dogyX3
      @dogyX3 Před rokem +1

      lmao 😂

    • @exziodeluz2784
      @exziodeluz2784 Před rokem +6

      @@akgamer3666 poor GPU bruh

    • @rayhaanmalik7253
      @rayhaanmalik7253 Před rokem +18

      CPU and GPU: SIUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU

  • @SamarthCat
    @SamarthCat Před rokem +51

    I have never seen a text-to-speech youtuber with such great grammar!
    Very informational video :)

  • @unicodefox
    @unicodefox Před rokem +378

    It's possible for malware to infect the host if there's a bug in the hypervisor or your cpu's virtualisation extensions, howeverthese are very rare and I don't think I've ever seen one before.
    You're more likely to be infect due to shared folders or havint the networking enabled on the VM

    • @dwlive732
      @dwlive732 Před rokem +2

      What if we are using something like Kasam

    • @lavie69
      @lavie69 Před rokem +10

      Some viruses detects the vm and nukes the host

    • @saulsho29
      @saulsho29 Před rokem +17

      ​@@lavie69 how would that happen?

    • @vadym-beep1241
      @vadym-beep1241 Před rokem +2

      @@dwlive732 What is kasam?

    • @-..._-.
      @-..._-. Před rokem +25

      @@lavie69 I've seen a lot of viruses that detect VMs and start acting innocent, or just terminate, but I've never heard of one that nukes the host machine after detecting that it's in a VM. Could you provide an example?

  • @lixou
    @lixou Před rokem +105

    The temp folder CAN hold executables. Especially when using installers, because most time they are unzipping an executable inside them and in order to run them they need a file location so they get dropped into Temp. This can also happen for example when you copy an exe in WinRar, it will copy the exe to the real filesystem into Temp and then copies the path so CTRL+V can put the exe somewhere else

    • @erikungewiss1097
      @erikungewiss1097 Před rokem +1

      OHHHHHHHHHHH

    • @zNiemand
      @zNiemand Před rokem +1

      dude i was so scared when i saw executables in my temo folder, thanks!

  • @IcySavage
    @IcySavage Před rokem +152

    Kinda scary and informative because some of these things are happening on my computer so you may have just informed me of something I had no idea about😅

    • @enacku
      @enacku Před rokem +76

      Stop downloading porn torrents in your virtual box

    • @ayanamisuki
      @ayanamisuki Před rokem +6

      @@enacku lmao

    • @frid7434
      @frid7434 Před rokem +41

      @@enacku "but the shady guy on quora with no source said it was okay!!!"

    • @BalloonFN
      @BalloonFN Před rokem +1

      @@enacku No.

    • @BalloonFN
      @BalloonFN Před rokem +2

      @@enacku No, i don’t think i will

  • @tylern6420
    @tylern6420 Před rokem +51

    In case you are REALLY scared, enable isolation on the host and cutoff connections in cooporation with a very good antivirus software
    But at the end of the day, your best protection is YOU.
    just dont click on sussy things.

  • @Likemea
    @Likemea Před rokem +157

    Hello Lifeen, there is nothing to worry about. While using Vmware, your host cannot get infected. This is due, if you do not share clipboards or folders, or even your network, you will be safe. But it has small chance for infect. So thanks for this video. I am looking forward.

    • @thisfeatureisbad
      @thisfeatureisbad Před rokem +34

      You just have to disable all the features. There are scripts to make it easier. I remember when Enderman got his laptop almost killed as he started a virus on his XP machine and it went through the VMWare outside into his Windows 10 defender screaming.

    • @Likemea
      @Likemea Před rokem +6

      @@thisfeatureisbad 😁

    • @klarkbj4159
      @klarkbj4159 Před rokem +10

      @@thisfeatureisbad do you have the link to video?

    • @TheFimiTube
      @TheFimiTube Před rokem +23

      Even if you turn off all shared stuff. It is possible to break out of the VM and escape the hypervisor (in this case VmBox) and access the host. Tho vmware and co regulary update their software to prevent such expliots. Check out BlackHat for more info.

    • @bearfm
      @bearfm Před rokem +3

      @@TheFimiTube Yeah, plus there are private exploits. However, if you get infected just send the virus to VMWARE and report it.

  • @aleksandersats9577
    @aleksandersats9577 Před rokem +66

    Our teacher at school made us download a linux iso to use within virtualbox. Now the .iso file was infected, starting a virtual machine with the .iso caused it to infect the entire pc and school network. Windows defender noticed but the damage was already done.

    • @YourAverageNoobOnRoblox
      @YourAverageNoobOnRoblox Před rokem

      bro linux is already a hacking operating system

    • @aleksandersats9577
      @aleksandersats9577 Před rokem +32

      @@YourAverageNoobOnRoblox smh no it is not. Clearly you don't know really anything about it. Though yes it might be true that actual hackers prefer Linux because it's way more safe than shitty windows

    • @sjebsstuff1354
      @sjebsstuff1354 Před rokem +2

      @@aleksandersats9577 ..and simple programmers a lot of the time, lol

    • @MScienceCat2851
      @MScienceCat2851 Před rokem +2

      @@aleksandersats9577 I thought hackers and programmers use linux brcause they have more control since its open source?

    • @aleksandersats9577
      @aleksandersats9577 Před rokem +9

      @@MScienceCat2851 you can program and hack on any OS as long as the tools are there. On Linux though it might be easier to hack as you have full control over literally everything unlike windows. And the fact Linux is way better for concealing that you are a hacker

  • @Triro
    @Triro Před rokem +14

    If you get a advanced piece of malware that can go from virtual machine to host machine malware bytes isn't going to save you.

    • @lifeen
      @lifeen  Před rokem +4

      I've never seen nothing, bypass malwarebytes. If the file is suspicious, malwarebytes blocks it, and sends to threat labs. Even if an exploit was used to bypass vm flaws, malwarebytes gets the task terminated.

    • @xeniight
      @xeniight Před 8 měsíci +2

      i think you're underestimating malwarebytes.

  • @LOLOX_HD
    @LOLOX_HD Před rokem +8

    I am so happy that I watch informative tech videos. This one especially. It taught me some things I didn't know about. So this is how hackers really get your pc to be a part of the botnet. This is really scary and now I will be even more careful than ever.

  • @ntorr_
    @ntorr_ Před rokem +6

    Thank you so much for the video! I was searching about this topic a while ago and today I found your video in my recommendations page. Just what I was searching for. This video + reading the comment section has helped me a lot to understand. Greetings from a teacher :) (Systems&Networking is not my speciality but I use this tools with my students)

  • @Afif87123
    @Afif87123 Před rokem +2

    about malwarebytes blocking the "network" thing, it was because for your vm to be able to access internet, it need to go through your computer, through all of your firewall, which one of them is malwarebytes

  • @fun_iqp
    @fun_iqp Před rokem +66

    it depends more on your activities, because you can have shared clipboards and folders, a bridged adapter and still not get infected. But if you are behaving badly, don't be surprised by the outcome ;)

    • @user-lj4lo7cx7m
      @user-lj4lo7cx7m Před rokem +3

      Not really, there have been vulnerabilities with VirtualBox and VMware that can execute code from the guest machine to the host one

    • @fun_iqp
      @fun_iqp Před rokem +3

      @@user-lj4lo7cx7m I said "it depends MORE", not "exclusively".. before replying to just having the reason, read "unknown user". Of course a piece of software is never flawless, but in general terms, it's quite rare these ones get attacked succesfully

    • @fun_iqp
      @fun_iqp Před rokem

      @@whateverdope after you :)

    • @sakmeister
      @sakmeister Před rokem +1

      bro talks like my spam folder :((((

  • @Nytzzzzzzzzzz
    @Nytzzzzzzzzzz Před rokem +2

    goes much deeper than videos on this topic, very interesting

  • @bsctchrz
    @bsctchrz Před rokem +17

    You tell many times you cant see whats going on... And my brain just screams: TASK MANAGER

  • @PSY0PZ
    @PSY0PZ Před 2 lety +37

    around 9:50 when your host's Malwarebytes sends you an alert for blocked web traffic, I'm assuming this is simply because the Virtual Machine is piggybacking off of the host's network? And essentially there is nothing to worry about, it's just the network traffic inside the virtual machine being detected which does not affect the host? Only curious if you agree, I am a novice with this stuff.

    • @muki3856
      @muki3856 Před 2 lety +7

      @@lifeen i have SEP (Symantec Endpoint Protection) and i always wondered why am i getting pop-ups from antivirus when i am going to sites on VM. But now i know why 🙃

    • @laughingalien
      @laughingalien Před rokem +8

      Nicely stated, PSY0PZ. The VM (or hypervisor) is just another process making requests and receiving responses which have to pass through the host's security protections. Of equal concern is that when requests leave the VM (without going through a VPN) - your actual IP Address (of your router) is now known. This will invite unwanted attention from BOTS looking for open ports or port forwarding weaknesses (RDP, etc., ) on your infrastructure.

  • @ulfahnurhasanah1375
    @ulfahnurhasanah1375 Před rokem +5

    Thanks sir, for so nice n so useful programs you are giving us God Almighty bless you n your family

  • @RedVRCC
    @RedVRCC Před 5 dny

    Virtualbox has a few convenience features like shared clipboard and drag and dropping files. You can set it to off, from only guest to host, from only host to guest, and bidirectional. Are these potential attack vectors for malware to exploit? If i keep it set to host to guest only or off would it be safer? I rarely need to ever pull anything _out_ of the guest system anyways. Usually only ever use such features to drop files _into_ the guest that I need, such as executables for example.

  • @Yellowcat98
    @Yellowcat98 Před rokem +12

    easy fix: open a virtual machine in a virtual machine in a virtual machine. that why you will protect your computer a protection no hack able

    • @lifeen
      @lifeen  Před rokem +1

      Very possible if you have alot resources.

    • @Jack_ekrjgterbtonr
      @Jack_ekrjgterbtonr Před rokem +4

      @@lifeen or use an ENTIRE DIFFERENT operating system for the host

    • @wywlf6912
      @wywlf6912 Před rokem

      @@Jack_ekrjgterbtonr good idea

    • @user-gr9kh4rk6y
      @user-gr9kh4rk6y Před 14 dny

      I do that lmao, or i use my old laptop tha has nothing bout me, and diff wifi

  • @InfamousKoala
    @InfamousKoala Před rokem +13

    If you use virtual box, you can encrypt your internet ip and port. It is like using a separate wifi for your virtual box and your host machine. If you use that opetion i don't think it will spread to the host machine.

    • @sydrul8756
      @sydrul8756 Před rokem

      How give me step by step instructions 😁 please.

    • @InfamousKoala
      @InfamousKoala Před rokem +3

      @@sydrul8756 when you lauch your vm there is gonna be a newtork tab in the settings. There you can use different netowrk for your inbuilt vm

    • @Tomas-ml9nv
      @Tomas-ml9nv Před rokem

      What do people here mean by shared files can spread malware to host?

    • @InfamousKoala
      @InfamousKoala Před rokem

      @@Tomas-ml9nv if you share files from an infected pc, it might be shared as well

    • @dataserver3068
      @dataserver3068 Před 11 měsíci +2

      @@InfamousKoala if i use a different wifi in guest machine. will not virus escape to that other wifi"s connected device (other than host machine)? pls reply.

  • @shaikhjunaaydjs1217
    @shaikhjunaaydjs1217 Před 2 lety +57

    Won't the virus just infect other users on the network the host is in?

    • @ven._._.
      @ven._._. Před 2 lety +19

      just turn off your internet when u run the virus

    • @ven._._.
      @ven._._. Před rokem +6

      @@lifeen turn off your hosts wifi

    • @nu52927
      @nu52927 Před rokem +2

      first off if network sharing is on then yes maybe, otherwise no.

    • @jessejames586
      @jessejames586 Před rokem

      Pull out your Ethernet cable on your host machine first.

    • @NoTGhoZtDan
      @NoTGhoZtDan Před rokem

      idk maybe vpn

  • @TheOGSB817
    @TheOGSB817 Před rokem +9

    underrated channel

  • @NathanPriviated
    @NathanPriviated Před rokem +1

    The crack background is amazing. Anyways you helped me with the cracked apps.

  • @tomtheannoyingness1903
    @tomtheannoyingness1903 Před rokem +1

    question would less severe viruses be tolerated and not be carried to the host?

  • @Danblak08
    @Danblak08 Před rokem +4

    The quickest way for it to get through is having a share folder on the host (shows up as a drive in the vm) it can speedrun

    • @lifeen
      @lifeen  Před 2 měsíci

      Unless there's an exploit that weaponizes virtualbox to execute the file being copied to the host, its unlikely the malware will run. Your antivirus will just delete it.

  • @cougar-town
    @cougar-town Před 13 dny +1

    It is entirely possible for that happen, but it would have to be a very smart exploit to make that happen.

  • @j-man6001
    @j-man6001 Před 6 měsíci +2

    Very scary! Bravo to you good sir for being the testbed for our enjoyment! I think I’ll leave the virtual virus testing to more advanced folks…… for now lol

  • @ivanignacio2353
    @ivanignacio2353 Před rokem

    so it is correct to say that if i use windows and i want to try a cracked program on windows it will be safer to use dual boot and run ubuntu and here install a VM with windows so if a virus infect my virtual windows i wont affect me bc the host would be ubuntu?

  • @Dqrnan
    @Dqrnan Před 4 měsíci

    Would the Network spread be prevented by using a VPN on the Virtual Machine? I have a Mac and am looking to do a Virtual Machine of Windows/Linux/Home Assistant.

  • @Cranium9090
    @Cranium9090 Před rokem +2

    I know this is an unnecessary tip, but you can press down your middle mouse button on a link in your browser to open a new tab with the website.

  • @dbdb32
    @dbdb32 Před rokem +1

    music is very much needed on this content 🍿 love it

  • @Zaladeus
    @Zaladeus Před rokem +5

    This is one of my favourite videos to watch, I don’t know what it’s called but these kind of creepy viruses and Trojan’s website videos are so interesting. Amazing video 👍🏻

    • @jyj-6414
      @jyj-6414 Před rokem

      The loquendo, the Pc vibe, the virus theme. I just love it. It's so creepy and nostalgic at the same time. Damn.

    • @Zaladeus
      @Zaladeus Před rokem

      @@jyj-6414 honestly yeah, its all round just creepy with all of the malware having happy icons, it gives me goosebumps

  • @gameplayallgamesresidmon184

    btw to not get infected, Turn off network adpater, erase clipboard, VM Wifi then it will have 1% of spreading into host PC

  • @RoScriptRBX
    @RoScriptRBX Před rokem +4

    3:37 you can just press win+r to open run box and type appdata and enter then click local and temp (also open show hidden items)

    • @SmilerRyanYT
      @SmilerRyanYT Před rokem +2

      a quicker way with the run box is to type %temp% into it.

    • @RoScriptRBX
      @RoScriptRBX Před rokem +1

      @@SmilerRyanYT Oh yeah I forgot that

  • @DozerfleetProd
    @DozerfleetProd Před rokem

    So now I know why Mint virtual machines have little issue with shared folders, while Mac virtual machines are a nightmare to enable. Mint has very few viruses. Even Macs are more virus-prone!

  • @LavaKingPG3D
    @LavaKingPG3D Před 5 měsíci +1

    Moral of the story: be MEGA carful while testing computer viruses in your vm, be sure that you use a different connection in ur vm and use a Malwarebytes in youre man host pc for protection 😉
    Surf safely 😊

  • @alekescalante2010
    @alekescalante2010 Před rokem

    Doesn't virtual box have a setting when setting up the vm to not allow the vm to access or communicate with the host machine. Does that eliminate the issue.

  • @myrminki
    @myrminki Před rokem

    Can you do the same with Bottles the wine prefix sandboxing tool?

  • @joewharton7735
    @joewharton7735 Před rokem +5

    The correct answer to this is it depends. But if a hypervisor 0day is present then the answer is yes a skilled and aware malware dev can escape the vm. Other methods can be shared directories as mentioned. Vuln software on your host machine if they vm is not on an isolated network. But also if you have a shared clipboard via methods like clipboard hijacking files.

  • @phillydee3592
    @phillydee3592 Před 11 měsíci

    What if you didn't have a bridged connection from you VM to your host?does that mean that the virus will only be contained in the VM?

  • @WinstonG1
    @WinstonG1 Před rokem +2

    My 18 yr old sis was so scared for this to happend, he has almost no virtual machine experience

    • @WinstonG1
      @WinstonG1 Před rokem

      @@bloodbonnieking lmao

    • @hanthemaa
      @hanthemaa Před rokem

      @@bloodbonnieking what virtual machine does to a mf

  • @LuaTech
    @LuaTech Před rokem

    More please! Hope you get to 1k subs!

  • @jovanito
    @jovanito Před rokem +6

    Is there a safe way to just turn off the VBox VM wifi while running the "virus"? Trying to test some files out

    • @lifeen
      @lifeen  Před rokem +1

      Yap, the wifi icon is right there. The wifi drivers are in control panel,you can disable them, and re-enable later.

  • @lands1459
    @lands1459 Před rokem +3

    a few questions: i have a windows 11 VM running on a headless arch linux system under QEMU accessed through VNC, i want to do malware testing on it but i'm concerned a worm could discover my SMB share and try to put something on there or spread to my main pc on the network which is win 10. would this be possible? if so, is there an argument i could pass to qemu to disable the guest system's networking?

    • @lifeen
      @lifeen  Před rokem +1

      unix.stackexchange.com/questions/251721/how-to-disable-qemu-guest-access-to-host-ports

    • @tacokoneko
      @tacokoneko Před rokem

      you have GNU/Linux therefore you are safe. just delete all the bare metal windows on your network and use firewall on the host to block all the VMs from accessing any ports you do not explicitly allow. then everything will be secure.

    • @tacokoneko
      @tacokoneko Před rokem

      oh if you don't want any network enabled in guest at all then that's quite easy too it's just the following argument for qemu-system-x86_64 when you execute it on the host: -nic none

  • @staticziao
    @staticziao Před rokem

    someone of them are probably arent running cus its a vm as some are built to detect if its a vm

  • @darkwrldz7560
    @darkwrldz7560 Před rokem

    this feel like a whole movie lmao

  • @recepby
    @recepby Před rokem +2

    @Lifeen wow. With NAT, it is still possible to spread to host machine !
    Can you please recommend me a malware family which works in VM environment, performs network activity but not spread on host machine ?
    Is it possible ?
    I want to capture the network traffic of this infected machine.

    • @lifeen
      @lifeen  Před rokem +1

      Fakenet-ng works real good/ Wireshark

  • @xaviersavedra711
    @xaviersavedra711 Před rokem

    I recall being remotely controlled by someone on the Internet, I was a silly kid that downloaded Munecraft forceop hacks and portforwarded to get my Minecraft server on the Internet

  • @thepanzertech
    @thepanzertech Před rokem +3

    Does your virtualbox have the network adapter configured as NAT or bridge?

  • @melvinsgjr
    @melvinsgjr Před 10 dny

    If, for example, you have Linux, and Windows is installed in Virtual Box, then there is probably no chance of getting something

  • @ssadiestic
    @ssadiestic Před rokem +1

    i feel like this is an ad for malwarebytes lmao

  • @sebastiendube9487
    @sebastiendube9487 Před rokem +1

    Pretty educational. I love it.

  • @ExoticFoxy
    @ExoticFoxy Před 12 dny

    me watching without the audio and thinking when the virus is going to break the host machine

  • @Zunile03scape
    @Zunile03scape Před rokem +1

    Just asking as someone who dose not know this kind of thing is it possible to defeat this kind of problem with 2 hardware modems or networks. One for host connections and the other for the virtual machines where you prevented the installation on the opposite.
    Example: Network A or Modem A software installed on Host, but not Network B or Modem B.
    --- Network B or Modem B software Installed on VM, but not Network A or Modem A.

  • @user-kj7gs8bv3o
    @user-kj7gs8bv3o Před rokem +1

    It's been a wild ride.

  • @zulfiqarhussain2458
    @zulfiqarhussain2458 Před rokem +3

    Great video and very useful. Hope you could monetize it!

  • @goosebyte
    @goosebyte Před rokem

    Some almost facts, like the yellow banner meaning ”not safe to install” and not “not signed by paying Microsoft a bunch of money”

  • @hakaso
    @hakaso Před rokem

    Bruh, once malicious website downloaded viruses in my computer, but it downloaded antivirus too. Viruses were neutralised after restart. They were just opening random websites

  • @celestialgamingxd
    @celestialgamingxd Před rokem +10

    I havent watched the whole video, but i feel 100% sure already that the answer is yes, even though it would be hard as it would essentially require a sandbox escape from the VM.

  • @Oxey405
    @Oxey405 Před rokem +2

    very informative ! I'll watch my back and try software on a VM now :) (I did when I was suspicous but you know ; never trust computers)

  • @theloststarbounder
    @theloststarbounder Před rokem

    They won't delete the malware after this, there are countless videos about CNET and they hadn't deleted anything.

  • @rejaulkarim3797
    @rejaulkarim3797 Před rokem

    bro where chalk up u been, it is so cool

  • @seanrobinson-old-4463

    1:46 if you got malwarbytes installed and working, then you've got it. those crack sites either give you malware or the real deal, next to never is the real thing packaged with malware. so no dont uninstall malwarebytes if you finished the installation

  • @professionalanarchist
    @professionalanarchist Před rokem +2

    underated youtuber looking forward to more

    • @lifeen
      @lifeen  Před 6 měsíci +1

      Currently learning, doing computer science, and its taking up all of my time, but am still here. i'll be making more high quality documentaries like these in the future....

  • @done1248
    @done1248 Před rokem +21

    Thank you so much bro I wanted to download steamunlocked games but as soon as I saw this video I was like just get the game with real money. We can appriciate that this guy took risk of his own pc for us Thank you once again 😊

    • @lifeen
      @lifeen  Před rokem +9

      I can show you a simple way to play cracked games without problem. Use sandboxie.
      Harden it by making apps think they are runñing admin, and disable internet access for apps you install inside there.
      Don't drop admin, coz most games won't play. If you have a border while playing the game reduce the border size to 2.

    • @ztxrihha264
      @ztxrihha264 Před rokem +1

      @@lifeen Hey, is it possible that you explain a bit more.
      I'm new to this, so I don't know anything
      What is sandboxie?
      How to download cracked software without any viruses?
      Do you know best websites for that?

    • @ANXvariable
      @ANXvariable Před rokem

      commenting for notifs

    • @lholder689
      @lholder689 Před rokem

      @@lifeen 🙏🙏🙏appreciate you for this man

    • @cookieproductionsistoast
      @cookieproductionsistoast Před rokem

      @@lifeen you never made it

  • @pokeepoof
    @pokeepoof Před rokem +1

    Soo your "real time protection browser testing" with websites blocked due to trojan is nothing to do with malewarebytes application and is entirely from the browser installed malewarebytes browser guard which is completely free to use and doesn't require a subscription or the desktop app from malewarebytes at all, which you should know as it isn't installed with the malewarebytes app and you manually added it to your browser. It even has the standard "browser guard" at the upper left which is as you can guess from the browser guard addon, if it was from the app it would say malewarebytes or malewarebytes premium. All this really means is browser guard did it faster but just something to note when saying it shows your desktop app blocking the sites :D

  • @zarmeenayasmee4522
    @zarmeenayasmee4522 Před rokem +1

    for each track/instrunt?

  • @SolomonUcko
    @SolomonUcko Před rokem +1

    Guess what? If you give your VM network access, it can use the network to attempt to spread computer worms! Wow, who would've thought?

    • @maxxsee
      @maxxsee Před 10 měsíci

      how do we transfer the files then, log into dropbox or something?

  • @Kokomilenkoski1202
    @Kokomilenkoski1202 Před 15 dny

    Yes, some malware such as ransomware can encrypt the main computer's files without file sharing set to none on a virtual machine

  • @rainbowpcdash
    @rainbowpcdash Před 2 měsíci

    People's been saying that virus protection has been killing people's computer Even my best friend said that and he's smart

  • @FarmerChazman
    @FarmerChazman Před rokem +2

    that was a nice video it definitely helped out, thankyou so much and you just earned a sub

  • @belgudei5986
    @belgudei5986 Před rokem +1

    These type of videos are very interesting
    Thank you for risking ur machine for this video

    • @lifeen
      @lifeen  Před 6 měsíci +1

      I had a snapshot😅😅

  • @user-gf6bu9df5d
    @user-gf6bu9df5d Před rokem

    well... I got hacked a couple of months ago and it was because I downloaded software from malicious sites and I had binance app on pc so the hacker did sometihng called cookies hijacking and stole all of my crypto
    and now I`m thinking of putting my crypto exchanges apps on a vm and my sensitive stuff there
    my question is
    what if it was the other way around will my vm be safe?
    plz reply

  • @doompohs9897
    @doompohs9897 Před 9 měsíci

    Bitdefender plus malwarebytes plus kaspersky = god trio

  • @Stali2412
    @Stali2412 Před rokem +3

    thank you so much man i learned a lot in this video

  • @sunflake_
    @sunflake_ Před rokem

    yes it can, it is called a virtual machine bypass or something i forgot

  • @ikii_
    @ikii_ Před 13 dny

    Very good video, though Id like to see you voiceover/speak live instead of doing TTS, it would be more comfortable to watch

  • @copier7437
    @copier7437 Před rokem

    i really apreciate your help with dowloanding this software

  • @Aeroguy_09
    @Aeroguy_09 Před rokem +4

    Imagine if you downloaded a malware on virtualbox and it was so dangerous and spread so much that it got to your actual computer...
    My god, that'd be absolutely terrifying.

  • @Not-jeb
    @Not-jeb Před 12 dny

    At some point I think it dose because original file store in host pc

  • @joyevasco3268
    @joyevasco3268 Před rokem +1

    People like you get the video maker in trouble. The company that owns soft soft, Image Line, are very aggressive with piracy. They read

  • @Tearz-tearify
    @Tearz-tearify Před rokem +1

    just watched this entire vid haha, i love it

  • @tigreonice2339
    @tigreonice2339 Před rokem

    Is theres a risk using your own voice to make you video? Nice video btw

  • @xd-dk5kz
    @xd-dk5kz Před rokem

    I asked this every time I was seeing a video of trying viruses in a virtual machine

  • @dreammaker9642
    @dreammaker9642 Před měsícem

    Any way to open the script without running it to check out the source code?

  • @jakob1486
    @jakob1486 Před rokem +2

    Save your 20 minutes:
    Answer is Yes

  • @geowhat
    @geowhat Před rokem

    I know there are ways to check if the virus is ran in a vm and if it is and you have wifi/ethernet on it can infect your main pc

  • @baburali9969
    @baburali9969 Před rokem

    Thank You Very Much I Really Plan On Being An Upcoming Producer??

  • @sowryamcproo
    @sowryamcproo Před rokem +2

    , during the second wave..

  • @jeromecanoy1999
    @jeromecanoy1999 Před rokem +1

    man. Thank you!

  • @konakona_.
    @konakona_. Před rokem +1

    now run a virtual machine in a virtual machine

  • @XlyVile
    @XlyVile Před 2 lety +2

    If i have same folders on my usb / hardrive *Before* the virus, and than i disconnect my usb/hard drive than my computer gets infected than is my usb /hard drive safe?

    • @GrizlikD
      @GrizlikD Před 2 lety +1

      Yes, the files should be safe, but some ransomwares encrypts connected folders, so if you connect it back, it might get infected too

    • @lifeen
      @lifeen  Před 2 lety +3

      Yes safe, coz you disconnected USB before getting infected.

    • @XlyVile
      @XlyVile Před 2 lety

      @@lifeen okay , thanks for the answer

  • @WinterAsked
    @WinterAsked Před rokem

    i feel like my computer is boutta get that virus lol

  • @curioussmiler4830
    @curioussmiler4830 Před rokem

    i love how u explain everything, likes for u 👍

  • @alfatech8604
    @alfatech8604 Před rokem +2

    A hypervisor Exploit can be exploited to infect the host machine

    • @lifeen
      @lifeen  Před 6 měsíci

      Most antiviruses these days have exploit detection, they just terminate suspicious apps, or run them in a sandbox before releasing it to the main system, eg you can see that feature in avast premium... it's hard for the exploit to succeed. Even a simple hello world program won't run, unless avast has run it first in a sandbox, or you've added the folder to exclusions.
      And the level of AI that is being integrated into antiviruses, it's going to be harder for exploits to bypass.

  • @CatAywa
    @CatAywa Před rokem +3

    the fork video downloader

  • @optionapoop
    @optionapoop Před rokem

    this background music is making me feel like its plague inc

  • @sohotcall
    @sohotcall Před rokem +1

    just put your virtual machine inside a virtual machine.