![]() Parallels has the weakest protection of the trio. Let us have a look at what the developers of the three VMs do to protect their content. However, the encryption strength and the resulting password recovery speeds are vastly different between these VMs. The most common virtual machines that can encrypt the entire image are Parallels, VMWare, and VirtualBox. We built a tool to enable experts run hardware-accelerated distributed attacks on passwords protecting encrypted VM images created by VMWare, Parallels, and VirtualBox. Evidence stored in encrypted VM images can be only accessed if one can produce the original encryption password. Many types of virtual machines used in the criminal world feature secure encryption. The ability to analyze virtual machines becomes essential when performing digital investigations. Activities performed under the virtual umbrella leave trails mostly in the VM image files and not on the host computer. Virtual machines use a portable, hardware-independent environment to perform essentially the same role as an actual computer. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |