Hypervisor-Phantom
Hypervisor-Phantom copied to clipboard
A type 1 & 2 hypervisor setup guide for evading detection from Proctors and Anti-Cheats.
Info & Guide
Proctoring Software
| Software | Browser Extension | System Test | Bypassed |
|---|---|---|---|
| Pafish | Link | ✅ | |
| Al-Khaser | Link | ❔ | |
| Safe Exam Browser | Link | ✅ | |
| Pearson VUE | Link | ✅ | |
| ProctorU | ✅ | FF Addon or Chrome Addon | ✅ |
| ProctorU: Guardian Browser | Link | ✅ | |
| Proctorio | ✅ | Link | ✅ |
| Examity | ✅ | New Platform System Check or Chrome Addon or FF Addon | ✅ |
| Respondus (LockDown Browser) | ✅ | Link | ✅ |
| Kryterion | Link | ✅ | |
| Honorlock | ✅ | Link | ✅ |
Bypassing HDCP
Bypassing HDCP Visual Graph:
Capture Card Format Support:
Cheapo Bypass Kit:
Elegant Bypass Kit (Recommended):
- 1x2 HDMI Splitter
$20-30> ViewHD - EDID Emulator
$20> HD-EWB - USB HDMI Capture Card
$130-200> Elgato HD60 X
Equipment
- Capture Card(s)
- 1x2 HDMI Splitter(s)
- EDID Emulator(s)
Virtual Video & Audio
Bring live video from your smartphone, remote computer, or friends directly into OBS or other studio software.
VB-CABLE Virtual Audio Device
Virtual Display Driver
VPN + Hypervisor
- IMPORTANT: Ensure not to add a custom DNS configuration to the guest system on the hypervisor if your host system's VPN uses custom DNS block lists. Doing so may result in your guest hypervisor system losing its internet connection!
Mullvad VPN + QEMU
- For the VPN connection to get properly natted/bridged you must enable the setting
Local network sharingoption!- How to:
⚙️>VPN settings>Local network sharing✅
- How to:
QEMU Anti Detection
| Type | Engine | Bypassed |
|---|---|---|
| Anti-Cheat | Anti Cheat Expert(ACE) | ✅ |
| Anti-Cheat | BattlEye (BE) | ✅ (With RDTSC VM Force Exit Kernal Patch) |
| Anti-Cheat | Easy Anti-Cheat(EAC) | ✅ |
| Anti-Cheat | Gepard Shield | ✅ (With RDTSC VM Force Exit Kernal Patch) |
| Anti-Cheat | Mhyprot | ✅ |
| Anti-Cheat | nProtect GameGuard(NP) | ✅ |
| Anti-Cheat | Roblex | ‼️(The application encountered an unrecoverable error) |
| Anti-Cheat | Vanguard | ‼️(1: Incorrect function) |
| Encrypt | Enigma Protector | ✅ |
| Encrypt | Safegine Shielden | ✅ |
| Encrypt | Themida | ✅ |
| Encrypt | VMProtect | ✅ |
| Encrypt | VProtect | ✅ |
- ‼️ Some games cannot run under this environment, but I'm not sure whether qemu has been detected. The game doesn't say "Virtual machine detected" specifically.
Proctoring Functions
Honorlock
| Function | Description |
|---|---|
| Record Webcam | Record student's testing enviroment using webcam |
| Record Screen | Record student's screen during exam |
| Record Web Traffic | Log student's internet activity |
| Room Scan | Record a 360 degree enviroment scan before the assessment begins |
| Disable Copy/Paste | Block clipboard actions |
| Disable Printing | Block printing exam content |
| Browser Guard | Limit browser activity to exam content and allowed site URLs only |
| Allowed Site URLs | Allow access to specific websites during an exam session |
| Student Photo | Capture student photo before the assessment begins |
| Student ID | Capture ID photo before the assessment begins |
Proctorio
| Recording Settings | Verification Settings | Lock Down Settings |
|---|---|---|
| Record Video | Verify Video | Force Full Screen |
| Record Audio | Verify Audio | Only One Screen |
| Record Screen | Verify Identity | Disable New Tabs |
| Record Web Traffic | Verify Desktop | Close Open Tabs |
| Record Desk | Verify Signature | Disable Printing |
| Disable Clipboard | ||
| Clear Cache | ||
| Disable Right Click | ||
| Prevent Re-Entry |
Pearson VUE
BrowserLock
-
System Requirements Link
-
Exam Content & Special Configurations (SDS)
https://securedelivery-hs-prd-1.pearsonvue.com/SecureDeliveryService
- Application location:
%APPDATA%\OnVUE\BrowserLock.exe
- Log file location:
%LOCALAPPDATA%\BrowserLock\log
- Commands it runs
# Obtains NetConnectionID
wmic nic where "NetConnectionStatus = 2" get NetConnectionID /value
# Obtains USB FriendlyName
powershell.exe Get-PnpDevice -PresentOnly | Where-Object { $_.InstanceId -match '^USB' }
# Obtains Display/Monitor FriendlyName
powershell.exe -Command "Get-WmiObject -Namespace 'root\WMI' -Class 'WMIMonitorID' | ForEach-Object -Process { if($_.UserFriendlyName) { ([System.Text.Encoding]::ASCII.GetString($_.UserFriendlyName)).Replace('$([char]0x0000)','') } }"
# Obtains running processes
powershell.exe /c Get-CimInstance -className win32_process | select Name,ProcessId,ParentProcessId,CommandLine,ExecutablePath
# Obtains MachineGUID
powershell (Get-ItemProperty registry::HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\ -Name MachineGuid).MachineGUID
# Obtains system hostname
C:\Windows\system32\cmd.exe /c hostname
- Hypervisor System Checks (in log file):
# LOG:
XXXX-XX-XX XX:XX:XX.XXX-XXXX [BROWSER LOCK] [INFO] VM Allowed flag value from forensics is vmAllowedForensic=false
XXXX-XX-XX XX:XX:XX.XXX-XXXX [BROWSER LOCK] [INFO] Multiple Monitor Allowed flag value from forensics is multiMonitorAllowedForensic=false
XXXX-XX-XX XX:XX:XX.XXX-XXXX [BROWSER LOCK] [INFO] VPN Allowed flag value from forensics is vpnAllowedForensic=true
XXXX-XX-XX XX:XX:XX.XXX-XXXX [BROWSER LOCK] [INFO] Shutdown file monitor started
XXXX-XX-XX XX:XX:XX.XXX-XXXX [BROWSER LOCK] [INFO] VM configuration received from SDS will be applied for validation
XXXX-XX-XX XX:XX:XX.XXX-XXXX [BROWSER LOCK] [INFO] VM detection value is: vmDetectConfig=true
XXXX-XX-XX XX:XX:XX.XXX-XXXX [BROWSER LOCK] [INFO] Multiple monitor configuration received from SDS will be applied for validation
XXXX-XX-XX XX:XX:XX.XXX-XXXX [BROWSER LOCK] [INFO] Multiple monitor detection value is: multipleMonitorDetectConfig=true
XXXX-XX-XX XX:XX:XX.XXX-XXXX [BROWSER LOCK] [INFO] VPN configuration received from forensics will be applied for validation
XXXX-XX-XX XX:XX:XX.XXX-XXXX [BROWSER LOCK] [INFO] VPN detection value is: vpnDetectConfig=false
XXXX-XX-XX XX:XX:XX.XXX-XXXX [BROWSER LOCK] [INFO] USB mass storage detection value is: usbDetectConfig=false
XXXX-XX-XX XX:XX:XX.XXX-XXXX [BROWSER LOCK] [INFO] Minimum browserlock version required: 2304
XXXX-XX-XX XX:XX:XX.XXX-XXXX [BROWSER LOCK] [INFO] Current browserlock version: 2402.1.1
XXXX-XX-XX XX:XX:XX.XXX-XXXX [BROWSER LOCK] [INFO] Check if Browserlock running on VM: {DMI type 1 (System Information) - Product Name}, {DMI type 2 (Base Board Information) - Serial Number}, runningOnVM=false
XXXX-XX-XX XX:XX:XX.XXX-XXXX [BROWSER LOCK] [INFO] VM check: diskSize=499 GB
XXXX-XX-XX XX:XX:XX.XXX-XXXX [BROWSER LOCK] [INFO] Browserlock is not running on virtual machine
XXXX-XX-XX XX:XX:XX.XXX-XXXX [BROWSER LOCK] [INFO] Display HDCP supported check: hdcpSupported=true
XXXX-XX-XX XX:XX:XX.XXX-XXXX [BROWSER LOCK] [INFO] Number of display devices connected: AWT=1, Physical=1, Physical/Virtual=1, Duplicate=1
# BrowserLock Booleon Variables
- hdcpSupported
- multiMonitorAllowedForensic
- multipleMonitorDetectConfig
- runningOnVM
- usbDetectConfig
- vmAllowedForensic
- vmDetectConfig
- vpnAllowedForensic
- vpnDetectConfig
Hypervisor Setup Guide
VirtualBox
Virtual Box - VBoxManage Tool Location:
Linux: /usr/bin/VBoxManage
Mac OS X: /Applications/VirtualBox.app/Contents/MacOS/VBoxManage
Oracle Solaris: /opt/VirtualBox/bin/VBoxManage
Windows: C:\Program Files\Oracle\VirtualBox\VBoxManage.exe
Run these scripts:
- Configure the VM:
VM-External-Modifer.ps1 - Spoof Windows:
VM-Internal-Modifier.ps1
ExecutionPolicy Modifier:
Set-ExecutionPolicy -ExecutionPolicy Bypass -Scope Process -Force
Building a Custom Version
Dependencies
sudo apt update && sudo apt upgrade -y && sudo apt autoremove -y && sudo apt install -y acpica-tools chrpath doxygen g++-multilib libasound2-dev libcap-dev libcurl4-openssl-dev libdevmapper-dev libidl-dev libopus-dev libpam0g-dev libpulse-dev libqt5opengl5-dev libqt5x11extras5-dev qttools5-dev libsdl1.2-dev libsdl-ttf2.0-dev libssl-dev libvpx-dev libxcursor-dev libxinerama-dev libxml2-dev libxml2-utils libxmu-dev libxrandr-dev make nasm python3-dev python-dev qttools5-dev-tools texlive texlive-fonts-extra texlive-latex-extra unzip xsltproc default-jdk libstdc++5 libxslt1-dev linux-kernel-headers makeself mesa-common-dev subversion yasm zlib1g-dev glslang-tools ia32-libs libc6-dev-i386 lib32gcc1 lib32stdc++6
Building VirtualBox
./configure --disable-hardening && source ./env.sh && kmk all &&
VMware
VMware PRO License Key:
MC60H-DWHD5-H80U9-6V85M-8280D
Patching BIOS ROM
- Locate file
BIOS.440.ROMwithin%PROGRAMFILES(X86)%\VMware\VMware Workstation\x64. - Utilize Phoenix BIOS Editor to modify compromising DMI Strings, like
VMwareorVirtual Platform. - Once completed, go to
FilethenBuild BIOSand save the patched BIOS somewhere. Don't overwrite the original file! - Now within the
*.vmxconfig file, make sure to add the new patched BIOS location for thebios440.filenameargument line.
Set Custom CPUID (optional)
Add the following into your *.vmx
bios440.filename = "C:\<path_to_your_bios_file>\BIOS.440.PATCH.ROM"
hypervisor.cpuid.v0 = "FALSE"
smbios.reflectHost = "TRUE"
ethernet0.address = "00:C0:CA:A7:2B:9E"
isolation.tools.getPtrLocation.disable = "TRUE"
isolation.tools.setPtrLocation.disable = "TRUE"
isolation.tools.setVersion.disable = "TRUE"
isolation.tools.getVersion.disable = "TRUE"
monitor_control.restrict_backdoor = "TRUE"
monitor_control.virtual_rdtsc = "FALSE"
IMPORTANT
smbios.reflectHostwill NOT fully function properly if UEFI firmware is used without the BIOS ROM patch. If you use BIOS firmware instead, you don't have to worry about doing the BIOS ROM patch (you can still do it if you want though).
Run these scripts:
- Spoof Windows:
VM-Internal-Modifier.ps1
ExecutionPolicy Modifier:
Set-ExecutionPolicy -ExecutionPolicy Bypass -Scope Process -Force
QEMU
QEMU + Virt-Manager Setup
sudo apt update && sudo apt upgrade -y && sudo apt autoremove -y && sudo apt clean -y
sudo apt install qemu-system-x86 libvirt-clients libvirt-daemon-system libvirt-daemon-config-network bridge-utils virt-manager ovmf
sudo usermod -a -G kvm,libvirt $(whoami)
sudo systemctl enable libvirtd && sudo systemctl start libvirtd && sudo groups $(whoami)
sudo virsh net-autostart default && sudo virsh net-start default
virt-manager
QEMU Strings Patch [smbios, ACPI Tables, USB, etc...]
Dependencies
sudo apt update && sudo apt upgrade -y && sudo apt autoremove -y && sudo apt install -y binutils-mingw-w64 binutils-mingw-w64-i686 binutils-mingw-w64-x86-64 build-essential clang g++-mingw-w64 g++-mingw-w64-i686 g++-mingw-w64-x86-64 gcc-mingw-w64 gcc-mingw-w64-i686 gcc-mingw-w64-x86-64 git git-email gnutls-bin libaio-dev libbluetooth-dev libbrlapi-dev libbz2-dev libcacard-dev libcap-dev libcap-ng-dev libcurl4-gnutls-dev libfdt-dev libglib2.0-dev libgtk-3-dev libibverbs-dev libiscsi-dev libjpeg8-dev liblzo2-dev libncurses5-dev libncursesw5-dev libnfs-dev libnuma-dev libpam0g-dev libpixman-1-dev librbd-dev librdmacm-dev libseccomp-dev libsnappy-dev libsasl2-dev libsdl1.2-dev libsdl2-dev libsdl2-image-dev libspice-protocol-dev libspice-server-dev libusb-1.0-0-dev libusb-dev libusbredirparser-dev libusbredirparser1 libvde-dev libvdeplug-dev libvirglrenderer-dev libvte-2.91-dev libxen-dev libxml2-dev libz-mingw-w64-dev libzstd-dev ninja-build valgrind win-iconv-mingw-w64-dev xfslibs-dev zlib1g-dev
Make custom QEMU .patch file
cd $HOME/Downloads && git clone --depth 1 --branch v8.2.2 --recursive https://gitlab.com/qemu-project/qemu.git && cd qemu/
# Edit all compromised strings within the source code...
grep -Rn '"QEMU ' "$HOME/Downloads/qemu"
grep -Rn '"QEMU' "$HOME/Downloads/qemu"
grep -Rn 'Virtual Machine"' "$HOME/Downloads/qemu"
grep -Rn 'Virtual CPU version "' "$HOME/Downloads/qemu"
grep -Rn '"KVM/Linux "' "$HOME/Downloads/qemu"
grep -Rn '"KVMKVMKVM\\0\\0\\0"' "$HOME/Downloads/qemu"
grep -Rn 'ACPI_BUILD_APPNAME6 "BOCHS "' "$HOME/Downloads/qemu"
grep -Rn 'ACPI_BUILD_APPNAME8 "BXPC "' "$HOME/Downloads/qemu"
grep -Rn '\[STR_SERIALNUMBER\]' "$HOME/Downloads/qemu"
grep -Rn '"QM%05d"' "$HOME/Downloads/qemu"
git diff > v8.2.2.patch
-
ACPI_BUILD_APPNAME6 "ALASKA"
-
ACPI_BUILD_APPNAME8 "A M I "
-
ACPI_BUILD_APPNAME6 "DELL "
-
ACPI_BUILD_APPNAME8 "Dell Inc"
Downloading & Building QEMU w/patch
cd $HOME/Downloads && git clone --depth 1 --branch v8.2.2 --recursive https://gitlab.com/qemu-project/qemu.git
cd qemu/ && git apply v8.2.2.patch && cd .. && mkdir qemu_build && cd qemu_build && ../qemu/configure --target-list=x86_64-softmmu,x86_64-linux-user --prefix=/usr && make -j $(nproc) && sudo make install
sudo mv -f qemu-system-x86_64 /bin
QEMU RDTSC VM_Exit Kernal Patch
Dependencies
- Arch
sudo pacman -S base-devel bc coreutils cpio gettext initramfs kmod libelf ncurses pahole perl python rsync tar xz
- Debian
sudo apt install bc binutils bison dwarves flex gcc git gnupg2 gzip libelf-dev libncurses5-dev libssl-dev make openssl pahole perl-base rsync tar xz-utils
- Fedora
sudo dnf install binutils ncurses-devel \
/usr/include/{libelf.h,openssl/pkcs7.h} \
/usr/bin/{bc,bison,flex,gcc,git,gpg2,gzip,make,openssl,pahole,perl,rsync,tar,xz,zstd}
Download latest Kernal release
Extracting the tarball
tar -xf linux-*.tar && cd linux-*/
PCIe Passthrough (Debian Guide)
1. Make sure to enable the following in the host UEFI/BIOS
| AMD CPU | Intel CPU |
|---|---|
| IOMMU | VT-D |
| NX | VT-X |
| SVM |
Requirements
- Virtualization Check
LC_ALL=C lscpu | grep Virtualization && egrep -c '(vmx|svm)' /proc/cpuinfo
- List PCI Devices
lspci -nn | grep "NVIDIA"
or
- List IOMMU Groups
#!/bin/bash
shopt -s nullglob
for g in /sys/kernel/iommu_groups/*; do
echo "IOMMU Group ${g##*/}:"
for d in $g/devices/*; do
echo -e "\t$(lspci -nns ${d##*/})"
done;
done;
Modify grub.cfg
- GRUB_CMDLINE_LINUX_DEFAULT="amd_iommu=on iommu=pt vfio-pci.ids=XXXX:XXXX,XXXX:XXXX,XXXX:XXXX,XXXX:XXXX"
sudo nano /etc/default/grub
Update grub.cfg & reboot
sudo update-grub && sudo reboot now
Modify vfio.conf (isolate GPU)
- options vfio-pci ids=XXXX:XXXX,XXXX:XXXX,XXXX:XXXX,XXXX:XXXX
- softdep nvidia pre: vfio-pci
sudo nano /etc/modprobe.d/vfio.conf
Update initramfs
sudo update-initramfs -c -k $(uname -r) && sudo reboot now
Check kernal driver in use for the isolated GPU (should be vfio-pci)
lspci -k | grep -E "vfio-pci|NVIDIA"
QEMU Virt-Manager Setup
- Create a new virtual machine
- Local install media (ISO image or CDROM)
- Select a Windows ISO and enter the OS you're using
- Set a realistic amount of RAM (make sure its half of the full amount)
| GB | MBs |
|---|---|
| 8 | 8192 |
| 16 | 16384 |
| 32 | 32768 |
- Set 1 less of the maximum amount of CPUs available
- Set a virtual disk size of above 250GB+
- Select "Customize configuration before install" and finish
- Select
UEFI x86_64:/usr/share/OVMF/OVMF_CODE_4M.ms.fdfor the Firmware, then apply 8a. If you want to use Windows 11 you need to useUEFI x86_64:/usr/share/qemu/edk2-x86_64-secure-code.fdinstead - Under
CPUs, checkCopy host CPU configuration (host-passthrough)9a. Drop downTopologyand checkManually set CPU topologythen input whatever works with your system, then apply
| Sockets: | Cores: | Threads: |
|---|---|---|
| 1 | X | X |
- Under
Boot OptionscheckSATA CDROM 1, then apply - Under
SATA Disk 1andSATA CDROM 1drop downAdvanced optionsand set a random custom serial #, then apply - Under
NIC:XX:XX:XXselect the drop down menu and pickhypervisor default12a. Set a custom MAC address, make sure the vendor isn't a hypervisor vendor! then apply - Select
Add Hardwareand underPCI Host Deviceadd ALL devices under the isolated GPU IOMMU group you figured out earlier - Now select
Begin Installation, and enjoy your new undetectable windows system!
QEMU XML Config
<os>
<smbios mode="host"/>
</os>
<features>
<acpi/>
<apic/>
<hyperv mode="custom">
<relaxed state="on"/>
<vapic state="on"/>
<spinlocks state="on" retries="8191"/>
<vpindex state="on"/>
<runtime state="on"/>
<synic state="on"/>
<stimer state="on"/>
<reset state="on"/>
<vendor_id state="on" value="AuthenticAMD"/>
<frequencies state="on"/>
</hyperv>
<kvm>
<hidden state="on"/>
</kvm>
<vmport state="off"/>
</features>
<cpu mode="host-passthrough" check="none">
<topology sockets="1" dies="1" cores="8" threads="2"/>
<cache mode="passthrough"/>
<feature policy="disable" name="hypervisor"/>
<feature policy="require" name="invtsc"/>
<feature policy="require" name="topoext"/>
<feature policy="require" name="svm"/>
</cpu>
<clock offset="utc">
<timer name="pit" tickpolicy="delay"/>
<timer name="rtc" tickpolicy="catchup" track="guest"/>
<timer name="hpet" present="no"/>
<timer name="tsc" present="yes" mode="native"/>
<timer name="hypervclock" present="yes"/>
</clock>
Looking Glass Setup Guide
- Client usage
- KVM (Kernel-based Virtual Machine) configured for VGA PCI Pass-through without an attached physical monitor, keyboard or mouse.
Add this to your .XML file in the devices section:
<shmem name='looking-glass'>
<model type='ivshmem-plain'/>
<size unit='M'>32</size>
</shmem>
Dependencies
sudo apt update && sudo apt upgrade -y && sudo apt autoremove -y && sudo apt install -y binutils-dev cmake fonts-dejavu-core libfontconfig-dev gcc g++ pkg-config libegl-dev libgl-dev libgles-dev libspice-protocol-dev nettle-dev libx11-dev libxcursor-dev libxi-dev libxinerama-dev libxpresent-dev libxss-dev libxkbcommon-dev libwayland-dev wayland-protocols libpipewire-0.3-dev libpulse-dev libsamplerate0-dev
Create a new file
sudo nano /etc/tmpfiles.d/10-looking-glass.conf
- Give it the following contents
# Type Path Mode UID GID Age Argument
f /dev/shm/looking-glass 0660 user kvm -
Granting Permissions
touch /dev/shm/looking-glass && chown $USER:kvm /dev/shm/looking-glass && chmod 660 /dev/shm/looking-glass
Download/Build/Install LookingGlass
curl -sSL https://looking-glass.io/artifact/stable/source -o latest.tar.gz && tar -zxvf latest.tar.gz && rm -rf latest.tar.gz
cd looking-glass-* && mkdir client/build && cd client/build && cmake ../ && make && sudo make install
./looking-glass-client
Testing it out...
- VFIO - EDID Emulator Review
- DP/HDMI/DVI/VGA Dummy Plug (EDID Emulator)
- USB Type C to DP Adapter <---> DP/HDMI/DVI/VGA Dummy Plug (EDID Emulator)
- Connect an additional DisplayPort or HDMI cable from your spare/isolated GPU to your monitor. Alternatively, you can utilize a DisplayPort or HDMI Bidirectional Switch Splitter for convenience.
QEMU General Patches
Important Tips
- Avoid NAT Similarities: Ensure your host and VM have distinct IPv4 addresses within the LAN to prevent obvious signs of VM activity, as identical addresses could signal VM use.
- Encrypt DNS Queries: Utilize DNS-over-HTTPS (DoH) to encrypt your DNS queries. Unlike unencrypted DNS, DoH conceals the websites you visit, leaving only the external IP address visible to observers.
- Opt for a VPN: Use a VPN to obscure all your internet traffic. However, be cautious with popular VPN services as their IP ranges may be blacklisted by certain proctoring or anti-cheat systems.
- Allocate Sufficient VM Storage: Equip your VM with at least 128GB of storage. VMs with lower storage capacities may be more easily identified or flagged by monitoring systems.
- System Up Time: Leave the hypervisor running for at least 12+ minutes to bypass the
GetTickCount()check.
References & Help
General
VirtualBox
- VirtualBox RDTSC Fix
- https://forums.virtualbox.org/viewtopic.php?t=78859
- https://forums.virtualbox.org/viewtopic.php?t=81600
- https://superuser.com/questions/625648/virtualbox-how-to-force-a-specific-cpu-to-the-guest
- https://berhanbingol.medium.com/virtualbox-detection-anti-detection-30614691f108
- https://github.com/d4rksystem/VBoxCloak
- https://github.com/nsmfoo/antivmdetection
VMware
QEMU
Common Error Solutions
Unable to complete install: 'internal error: cannot load AppArmor profile '{UUID}''
- Set security_driver = "none" in /etc/libvirt/qemu.conf
# security_driver = [ "selinux", "apparmor" ]
#security_driver = "selinux"
security_driver = "none"
- restart libvirtd service
systemctl restart libvirtd
NVIDIA Error 43
- Add this line in the
<hyperv/>section in the QEMU XML:
<vendor_id state="on" value="AuthenticAMD"/>
Error starting domain: internal error: qemu unexpectedly closed the monitor:
Error starting domain: internal error: qemu unexpectedly closed the monitor: 2021-08-02T17:52:25.005284Z qemu-system-x86_64: backing store size 0x2000000 does not match ‘size’ option 0x4000000
Step 1:
rm /dev/shm/looking-glass
Step 2:
<shmem name="looking-glass">
<model type="ivshmem-plain"/>
<size unit="M">128</size>
<address type="pci" domain="0x0000" bus="0x10" slot="0x01" function="0x0"/>
</shmem>
- Change memory number size to 32, 64, 128, etc. (whatever needed)
Step 3:
touch /dev/shm/looking-glass && sudo chown $USER:kvm /dev/shm/looking-glass && chmod 660 /dev/shm/looking-glass
- Now try to run your hypervisor again.
Elgato Capture Card - OBS Black Screen
- Some of Elgato's capture cards, leveraging UVC (USB Video Class) technology, operate seamlessly without requiring additional drivers. As UVC devices, they adhere to a standard protocol for transmitting video and audio data over USB connections. This plug-and-play functionality ensures compatibility with various operating systems, enabling effortless setup and use for capturing high-quality video content.
Step 1:
Download & Install the latest 4K CAPTURE UTILITY software from Elgato downloads page
Step 2:
Open Elgato 4K Capture Utility software and let the software initialize the UVC device and firmware.
Step 3:
Now select the settings icon on the top right of the software utility, and select Check for Updates.... (It should do it automatically already, but just make sure the firmware is on the latest version available.)
Step 4 (for Linux users):
Connect the capture card device back to your Linux host system now and open OBS, you should now see a valid output instead of a black screen.
Elgato Gaming Hardware Drivers
| Device | Driver Status |
|---|---|
| Elgato Cam Link | No driver since it's a UVC device |
| Elgato Cam Link 4K | No driver since it's a UVC device |
| Elgato Cam Link Pro | Latest Elgato Cam Link Pro Drivers for Windows |
| Elgato Game Capture HD | Latest Elgato Game Capture HD Drivers for Windows |
| Elgato Game Capture HD60 | Latest Elgato Game Capture HD60 Drivers for Windows |
| Elgato Game Capture HD60 S | Latest Elgato Game Capture HD60 S Drivers for Windows |
| Elgato Game Capture HD60 S+ | No driver since it's a UVC device |
| Elgato Game Capture HD60 Pro | Latest Elgato Game Capture HD60 Pro Drivers |
| Elgato Game Capture HD60 X | No driver since it's a UVC device |
| Elgato Game Capture 4K60 Pro | Latest Elgato Game Capture 4K60 Pro Drivers |
| Elgato Game Capture 4K60 Pro MK.2 | Latest Elgato Game Capture 4K60 Pro MK.2 Drivers |
| Elgato Game Capture 4K60 S+ | Latest Elgato Game Capture 4K60 S+ Drivers |
| Elgato 4K Pro | Latest Elgato 4K Pro Drivers |
Misc. Stuff
CompTIA Certification Stuff
CompTIA Certification Information:
Exam Dump Websites
ChatGPT Prompt
I'll provide questions with possible answers, I need you to reply with only the correct answer(s). Just state the answer; no explanations.
Search Engine Prompts
Security+
CompTIA Security+ SY0-701 Quizlet
Network+
- N10-008 Q&A
- N10-009 Q&A
CompTIA Network+ N10-008 Quizlet
A+
CompTIA A+ 220-1101 Quizlet
CompTIA A+ 220-1102 Quizlet
Pearson VUE (OnVUE)
Pearson OnVUE Online Exam Tips
Before Your Exam:
- Know the Exam Rules: Ignorance isn't an excuse for breaking rules.
- Room Setup: A clean, quiet space is ideal. Open spaces are fine if you ensure privacy. Background noise like alarms or construction is generally okay, but voices may prompt a room check.
- Preparation: Clear your desk except for necessary items. Apply for accommodations if needed for health reasons. Use the restroom and moderate your water intake before starting. Avoid using work computers due to potential restrictions. Ensure your computer has an external microphone, as headphones are not allowed.
Common Mistakes:
- Strict Rule Enforcement: Proctors strictly follow rules; personal circumstances (e.g., needing a restroom break) aren't considered exceptions.
- Technical Readiness: Have your laptop charger plugged in. Starting your exam means you cannot leave for any reason, including to grab your charger.
- Exam Start: The exam is considered started once you see the "Welcome" screen. Don’t leave your seat, use your phone, or fetch items after this point.
- Avoid Distractions: Don’t touch your phone or read questions aloud to prevent suspicion of cheating.
- Proper Closure: After finishing, ensure you exit the application completely to end the exam session.
General Info:
- Proctors can't assist with exam content or scoring.
- When unsure about rules, use the chat feature to ask.
- Proctors do monitor you with help from AI to detect unusual behaviors.
- Note taking is not allowed with pen and paper.
- Your exam session is recorded.
Example video of the OnVUE setup process:
https://github.com/Scrut1ny/Hypervisor-Phantom/assets/53458032/c7f0901b-bb61-4806-9efc-655ea50b5547