[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-users] Exploiting XEN


  • To: Xen-users@xxxxxxxxxxxxxxxxxxx
  • From: "Artur Baruchi" <mail.baruchi@xxxxxxxxx>
  • Date: Tue, 13 Mar 2007 11:42:41 -0300
  • Delivery-date: Tue, 13 Mar 2007 07:41:55 -0700
  • Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=beta; h=received:message-id:date:from:to:subject:mime-version:content-type:content-transfer-encoding:content-disposition; b=mKnocghElkMRztGLQzG8RUWM5EtJ2QUZ/2GYTpz6BHZY6NoD4n+hY9LEpKRy63n3EoEdvLc3AxKgzusQApmiHLd3awSuIURbQpXoGq3qd8Nj0hcVPQFPrnquVTHSpDLZZv4jHzinMcesuU2JpuxMJ4bbypTrm+GSDFWnfW3Dyag=
  • List-id: Xen user discussion <xen-users.lists.xensource.com>

Hi guys,

Im making somes researchs about security in Virtual Machines, and does
anybody knows, if exists a exploit or a rootkit for Xen? I would like
to test it (if exist).

Thanks,

Artur Baruchi

_______________________________________________
Xen-users mailing list
Xen-users@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-users


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.