In all of VMWare’s best practices they always state (and by default) that guest isolation copy and paste is disabled. This leads to more insecure ways of getting complex passwords from a host system password manager into a vm to paste in a field. For instance running \\servername\c$, authenticating with domain admin and creating a text file to paste… then in the VM opening that text file. Well now to me that’s even worse because the password was written to disk in clear text at some point, even if you delete it.
Sure I guess you can RDP and enable clipboard access there too..
Just curious, did someone somewhere forget they had something sensitive in the clipboard and threaten to sue vmware for it? I usually copy the letter A or something when I’m done just to clear the clipboard out.
View Reddit by kjstech – View Source