[Tutorial] How to make a stealthy Virtual Machine

1 Like

Not sure why you would want to let the scammers on your system in the first place. I don’t care how clever you are there is someone who will out smart you.

I can think of at lest 1 or 2 practical, everyday uses for this that do not involve scammers. Well, not as depicted, anyway…

1 Like

While the video focuses on “scamming the scammer”/“haxor’n da h4x0r” that’s just for views on youtube. This guy is effectively using as a honeypot (one node honeynet). Out in the field one usually would do this kind of thing on their honeynet.

Now a honeynet, for those who do not know, is a network set up with intentional vulnerabilities; its purpose is to invite attack, so that an attacker’s activities and methods can be studied and that information used to increase network security, collect evidence, establish training material, and shut down external threats.

Most honeynets sit on air gapped systems away from a main network or at the very least a vlan section within the DMZ on someone else’s cloud. so the threat of something getting through three layers of separation is not really an issue.

1 Like