Hacker Newsnew | past | comments | ask | show | jobs | submit | cryogenspirit's commentslogin

Q: does anyone know how to disable regular internet access in Windows except through a virtual machine (VMware or Virtualbox)?

I have set up my mom to use a live debian cd through VMware, but I would also like to disable networking through Windows Edge and Explorer. I don't know how to do this however.

Myself, I follow a similar scheme but using a linux virtual guest and host. Is it easy to disable networking for all networking except for apt/yum and vmware/kvm?

Lastly, does anyone know what it costs for a personal subscription to grsecurity?


My first thought would be to clear the routing table on Windows (maybe using a batch script on startup?) and using bridged networking in the VM.

That would totally disable internet access on Windows though, including updates (but you also wouldn't have that attack surface!)


Thanks. Had a brief look, seems useful.

Does the VM using the "nat" mode of networking also use Windows routing table? I don't know much about the networking between guest and host, except that the guest uses NetworkManager through its ethernet device. Even though this is a virtual device, I didn't think it would go through Windows' own net stack.

Would the bridged networking be any different than passing through the USB wifi adapter directly to VMware? (at which point the host doesn't have access to internet)


As far as I understand it, with bridged networking you're basically sharing the network device -- your VM has it's own stack down to the MAC address. So as long as your network device is still online (in the sense of being enabled in Windows and having a cable attached), packets for a particular MAC will travel to the right network stack.

This is probably useful from the VirtualBox manual:

> With bridged networking, VirtualBox uses a device driver on your host system that filters data from your physical network adapter. This driver is therefore called a "net filter" driver. This allows VirtualBox to intercept data from the physical network and inject data into it, effectively creating a new network interface in software...

I'd try it, it wouldn't be hard to reverse.


This site [1] discusses pretty much what you are asking (all networking going through a virtualbox pfSense) however it's written for windows 7, not sure if this still works for 8-10

http://timita.org/wordpress/2011/07/29/protect-your-windows-...

I would think if you set up the VM to deny everything coming from windows, and allow anything coming from the other linux VM it should work fine (just set up multiple NICs in the pfSense VM and have the linux VM go in through a different NIC than the host windows)

I personally do something similar with linux on linux where I have the host linux be allowed to only reach my internal network and the debian mirrors directly, and anything else is done through VMs.


Hello. Thanks for this. This is very close to what I was looking for. Security is a long journey, but it seems we can't avoid the task any more.

Hopefully we will find a way to be connected but not vulnerable to all these threats.


https://www.linkedin.com/pulse/penetration-testers-guide-win...

The above link seems pretty good for locking down Windows if anyone is looking.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: