View Single Post
Old 12-05-2014, 23:15   #31
qasdfdsaq
cf.mega poster
 
Join Date: Aug 2004
Posts: 11,207
qasdfdsaq is cast in bronzeqasdfdsaq is cast in bronzeqasdfdsaq is cast in bronzeqasdfdsaq is cast in bronze
qasdfdsaq is cast in bronzeqasdfdsaq is cast in bronzeqasdfdsaq is cast in bronzeqasdfdsaq is cast in bronzeqasdfdsaq is cast in bronzeqasdfdsaq is cast in bronzeqasdfdsaq is cast in bronzeqasdfdsaq is cast in bronzeqasdfdsaq is cast in bronzeqasdfdsaq is cast in bronzeqasdfdsaq is cast in bronzeqasdfdsaq is cast in bronzeqasdfdsaq is cast in bronzeqasdfdsaq is cast in bronze
Re: What do I do when Windows XP ends?

Quote:
Originally Posted by Ignitionnet View Post
ESXi uses its own kernel. It has a ton of similarities to RHEL, etc, but uses its own kernel and has a very small selection of libraries available. Any exploit would need to be compiled specifically for ESXi.
Ah, it was ESX (no i) that used the RHEL userspace and Linux 2.4 kernel.

Quote:
Something that does all that would be absolutely state of the art and likely way beyond my capability to analyse anyway. I'm not going to be downloading mysterious malware to test but recognised Windows PE only samples
Not something I'd expect to see outside of an academic proof of concept tbh, way too niche a target.


... Actually now that I think about it, maybe not. VMWare has a sizeable share in the enterprise virtualization market and compromising host machines could present a particularly juicy target.
qasdfdsaq is offline   Reply With Quote