OS Security Labs
Chroot Jail · Biba Integrity Model · Virtualization Architecture
Three self-contained interactive labs covering core OS security concepts. Each lab lets you manipulate the key variables of a security model and immediately observe the consequence — no server, no installation.
A chroot jail remaps the root of the filesystem for a specific process.
From inside the jail, the process believes / literally is
the jail directory — it cannot see, traverse, or open anything above it.
Scenario: a web server (nginx, running as www-data)
has been exploited. The attacker has arbitrary file-read. Toggle between free and jailed
to see what they can reach — then try the access tests.
The Biba model protects data integrity — preventing low-trust processes from corrupting high-trust data. Its two rules are elegantly symmetric and directly implemented in Windows as Mandatory Integrity Control (MIC).
Select an architecture to see how the software stack is arranged. Then click any component in the diagram to simulate a compromise — and see what else falls with it. This is the core question when evaluating isolation guarantees.
| Property | Type 1 | Type 2 | Container |
|---|---|---|---|
| Hypervisor runs on | Hardware directly | Host OS | N/A (container runtime) |
| Guest OS | Full, isolated | Full, isolated | None — shares host kernel |
| Kernel isolation | Strong | Strong (but extra layer) | None — kernel shared |
| If hypervisor/runtime compromised | All VMs at risk | All VMs at risk | All containers at risk |
| If Host OS compromised | Only bare hypervisor at risk | Hypervisor + all VMs | Runtime + all containers |
| Performance overhead | Low | Medium | Very low |
| Typical use | VMware vSphere, Hyper-V, KVM | VirtualBox, VMware Workstation | Docker, Kubernetes |