Cr4sh / prl_guest_to_host

Guest to host VM escape exploit for Parallels Desktop

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Guest to host VM escape exploit for Parallels Desktop.
Tested on Parallels Desktop 10 for Mac.

Works on all of the x86 and x64 Windows guests under the user accounts with any privileges level.

Known issues:

 * Command output might be missing when running from low-privileged user accounts.

More information at http://blog.cr4.sh/2014/11/simple-guest-to-host-vm-escape-for.html

Discovered by:    
Dmytro Oleksiuk
    
cr4sh0@gmail.com
http://blog.cr4.sh/

About

Guest to host VM escape exploit for Parallels Desktop


Languages

Language:C++ 55.1%Language:C 36.6%Language:Java 8.3%