OpenSource Ghost
Member
Ehanced BitLocker PIN + TPM + SecureBoot and 3rd party drive encryption tools with pre-boot authentication (BestCrypt or VeraCrypt or DiskCryptor) are typical solutions that can prevent attacker from successfully mounting victim's OS image on attacker's machine. In case attacker uses Virtual Machine on his/her PC/laptop to mount victim's OS image, what components can NTLite remove from victim's OS image to make such image as incompatible with being mounted on VM's as possible?
For example, some VM's rely on legacy drivers that victim's OS image may not need, but attacker's VM requires. Microsoft AHCI driver is not needed at by those running OS on Intel VMD RAID 19.X drivers, but many VM's do not support Intel VMD drivers.
Are there other components NTLite can remove to make OS images un-mountable in QuebesOS VM's or Docker VM's?
For example, some VM's rely on legacy drivers that victim's OS image may not need, but attacker's VM requires. Microsoft AHCI driver is not needed at by those running OS on Intel VMD RAID 19.X drivers, but many VM's do not support Intel VMD drivers.
Are there other components NTLite can remove to make OS images un-mountable in QuebesOS VM's or Docker VM's?