Can someone deeper into infosec confirm for me that if you attack Xen directly this thing becomes useless?
Also what's a good book on information systems and securing them so I can try for myself?
>>61665514
How could you attack Xen when dom0 has no network adapter attached?
(I mean you'd have to be extra good hacker)
>>61665527
You insert a network adapter by attacking Xen through the weakest link template VM, which shouldn't be hard since all the templates are outdated.
Use Virtualbox :^)
https://blog.xenproject.org/2012/06/13/the-intel-sysret-privilege-escalation/
Its possible yes
>>61665514
>if you attack Xen directly this thing becomes useless?
Which is better than just relying on any random part of the Linux or Windows system.
Im pretty sure i've dealt with an attack on Xen before using Qubes.
The easiest way in is by injecting packets into an http stream to try and exploit a browser weakness, I would imagine it is tough trying to tackle this thing from the outside as it comes with powerful iptable rulesets.
Look in the logs for a message saying "Guest VM did not return requested memory" this can be a heads up that Xen has been attacked
Honestly, im waiting until Qubes 4.0 when it will utilize HVM instead of the Xen paravirtualization that it does now. HVM's are much more secure.
How about genode? How about using a qemu with kvm on top of linux?