(no title)
NanoCoaster | 2 years ago
Which networking setup do you use for your pentesting VM? Ideally, I'd want a setup where the VM can access the internet (and therefore the HTB VPN), but not anything inside my local network. But I don't quite know how I could achieve that, at least in a way where I'd trust it to be reliable. Maybe the whole idea's a bit too paranoid to be practical in general, I don't know, so I'd love an expert opinion on this :)
Usually, I'd be using QEMU, but I'd be fine with using VirtualBox for this case if it includes something that makes this easier.
Manouchehri|2 years ago
https://github.com/xjasonlyu/tun2socks
NanoCoaster|2 years ago
Thank you :)
mrAssHat|2 years ago
3np|2 years ago
Then you can be more confident that (barring something escaping the VM), you have control of what a particular VM may or may not access. Also allows you to have a couple of different netvms (maybe one does give some access to your internal network, one connects only over tor, one via some VPN...) that you can switch between without needing to change anything on the actual VM of concern.
bongodongobob|2 years ago
NanoCoaster|2 years ago
Anyway, apart from this possibly impractical usecase, it just seems like an interesting problem.
I'll just go with a standard bridge + ip/nftables setup then. Thanks for the input.