I'm new to VMs and Kali, and since I downloaded it I had the questions (Am I safe? will my computer be affected? ) what I mean is: can't anyone gain access from the VM to the host system? or can someone track me somehow via the host system even if used vpn and macchanger on the VM? since kali as a VM connect to the internet via cable not wifi.
- Hot
- Active
-
Forum Thread: How to Hack Online Android Games !!? 18 Replies
3 hrs ago -
Forum Thread: Hack Instagram Account Using BruteForce 196 Replies
4 hrs ago -
Forum Thread: How to Hack a Website to Edit It 19 Replies
4 days ago -
Forum Thread: Android Doesn't Connect Back to Metasploit with App Payload? 18 Replies
5 days ago -
Forum Thread: Hacking Facebook,Twitter,Instagram Account Passwords with BruteForce 156 Replies
5 days ago -
Forum Thread: Kali Linux WiFi Problem? 41 Replies
1 wk ago -
How to: HACK Android Device with TermuX on Android | Part #1 - Over the Internet [Ultimate Guide] 173 Replies
1 wk ago -
Forum Thread: How to Start Listening Connections on Metaslpoit (WINDOWS) 8 Replies
1 wk ago -
Forum Thread: Grab Target's Webcam by Link 4 Replies
1 wk ago -
How to: HACK Android Device with TermuX on Android | Part #2 - Over WLAN Hotspot [Ultimate Guide] 24 Replies
1 wk ago -
Forum Thread: Complete Guide to Creating and Hosting a Phishing Page for Beginners 41 Replies
1 wk ago -
Forum Thread: No Wireless Extensions in Linux Debian 3 Replies
2 wks ago -
How to: Sign the APK File with Embedded Payload (The Ultimate Guide) 6 Replies
2 wks ago -
Forum Thread: Bruteforce Password Cracker (ghoster_brute) 6 Replies
2 wks ago -
Forum Thread: Txpower Adjustment? 17 Replies
2 wks ago -
Forum Thread: How to Controll Multiple Devices Using a Meterpreter ? 4 Replies
3 wks ago -
Forum Thread: Delete Infected Apk from Victim Phone Remotely 1 Replies
3 wks ago -
How to: Install Metasploit Framework on Android | Part #1 - in TermuX 81 Replies
3 wks ago -
Forum Thread: The Most Anonymous Reconnaissance Technique? 1 Replies
3 wks ago -
Forum Thread: Tp-Link wn8200nd 2 Replies
3 wks ago
-
How To: Null Byte's Hacker Guide to Buying an ESP32 Camera Module That's Right for Your Project
-
How To: Perform Keystroke Injection Attacks Over Wi-Fi with Your Smartphone
-
How To: This Top-Rated Audio & Video Production Bundle Is on Sale for $40
-
How to Hack Wi-Fi: Cracking WPA2 Passwords Using the New PMKID Hashcat Attack
-
How To: Gain SSH Access to Servers by Brute-Forcing Credentials
-
How To: Crack SSH Private Key Passwords with John the Ripper
-
How To: Hack Android Using Kali (Remotely)
-
Hacking Windows 10: How to Dump NTLM Hashes & Crack Windows Passwords
-
How To: Automate Wi-Fi Hacking with Wifite2
-
How To: Set Up a Headless Raspberry Pi Hacking Platform Running Kali Linux
-
How To: Use Burp & FoxyProxy to Easily Switch Between Proxy Settings
-
How to Hack Wi-Fi: Stealing Wi-Fi Passwords with an Evil Twin Attack
-
How To: Crack Shadow Hashes After Getting Root on a Linux System
-
How To: Hunt Down Social Media Accounts by Usernames with Sherlock
-
How To: Crack Password-Protected ZIP Files, PDFs & More with Zydra
-
Hack Like a Pro: How to Crack Passwords, Part 4 (Creating a Custom Wordlist with Crunch)
-
Hack Like a Pro: How to Crack Online Web Form Passwords with THC-Hydra & Burp Suite
-
How To: Hack Web Browsers with BeEF to Control Webcams, Phish for Credentials & More
-
How To: Build a Beginner Hacking Kit with the Raspberry Pi 3 Model B+
-
The Hacks of Mr. Robot: How to Send a Spoofed SMS Text Message
2 Responses
From the network point of view (layer 3 of ISO stack) having a VM in bridged mode on an host is the same as having 2 distinct hosts. Moreover if you're performing mischievous actions over Internet you should more worry about your ISP Router address (public IP address) than your VM IP address (that should be private). From that point of view using a VM or not makes no difference since they will track your router not your Kali.
I have never heard hacker breaking through a VM and gaining access on the host.
It's can be already quite technical to break through a container without mentioning a virtual machine.
thank you
Share Your Thoughts