Why a VM is required
The game is a working cybersecurity demonstration, not a simulation. When you start it:- A reverse shell connects to your listener machine over TCP.
- A persistence entry is written to your system (Windows Registry, Linux crontab, or macOS LaunchAgent) so the shell restarts after a reboot.
- A background process may run after the game window closes.
Recommended VM setup
VirtualBox
Free and cross-platform. Download from virtualbox.org. Any guest OS supported by VirtualBox works.
VMware
VMware Workstation Player (free for personal use) or VMware Fusion on macOS. Supports Windows and Linux guests.
Network configuration
- Host-only (recommended)
- NAT
- Bridged (not recommended)
Create a host-only network adapter in your VM software. The VM can only communicate with the host machine — it cannot reach the internet or other LAN devices.This is the safest option: the listener on your host receives the shell, and nothing else on your network is reachable from the VM.
Take a snapshot before running
Before starting the game for the first time, take a snapshot of the VM in its clean state. This gives you a one-click restore point if cleanup fails or if you want to repeat the exercise from scratch.VirtualBox
With the VM powered off or saved, go to Machine → Take Snapshot. Name it something like
clean-baseline.What the game does to the system
| Action | Detail |
|---|---|
| Reverse shell | Connects outbound to --host on port 5050. Provides a real interactive shell. |
| Persistence marker | Creates cyber_modules/simulated_startup/system_defender_autorun.txt. |
| Windows Registry | Writes HKCU\...\Run\VirusHunterAgent pointing at the game executable. |
| Linux crontab | Adds an @reboot entry that restarts the shell on boot. |
| macOS LaunchAgent | Installs com.v-hunter.agent.plist in ~/Library/LaunchAgents/. |
How to confirm you’re in a safe environment
Before launching the game, verify:- You are inside a VM, not on a physical host.
- The VM network adapter is set to host-only or NAT (not bridged to a production LAN).
- You have taken a snapshot of the clean VM state.
- The
--hostIP points to your listener machine, not to any shared infrastructure. - You have explicit permission to run penetration-testing tools on this environment (if it’s not solely your own).
What NOT to do
After-session checklist
Verify cleanup manually
Follow the platform-specific verification steps in Cleanup tool.