УМННБJ, ЯХВ. Войти !bnw Сегодня Клубы

YAY, чо обещают на black hat в августе:

In x86, beyond ring 0 lie the more privileged realms of execution, where our code is invisible to AV, we have unfettered access to hardware, and can trivially preempt and modify the OS. The architecture has heaped layers upon layers of protections on these negative rings, but 40 years of x86 evolution have left a labyrinth of forgotten backdoors into the ultra-privileged modes. Lost in this byzantine maze of decades-old architecture improvements and patches, there lies a design flaw that's gone unnoticed for 20 years. In one of the most bizarre and complex vulnerabilities we've ever seen, we'll release proof-of-concept code exploiting the vast, unexplored wasteland of forgotten x86 features, to demonstrate how to jump malicious code from the paltry ring 0 into the deepest, darkest realms of the processor. Best of all, we'll do it with an architectural 0-day built into the silicon itself, directed against a uniquely vulnerable string of code running on every single system.

https://www.blackhat.com/us-15/briefings.html#the-memory-sinkhole-unleashing-an-x86-design-flaw-allowing-universal-privilege-escalation

#PDWCIO / @ninesigns / 3486 дней назад

> In x86, beyond ring 0 lie the more privileged realms of execution, where our code is invisible to AV, we have unfettered access to hardware, and can trivially preempt and modify the OS. Свежо. Я еще когда в школе училась, читала про ring -1 руткиты. Да и потенциал ring -2 малвари за последние лет пять только ленивый не обсудил.
#PDWCIO/0WX / @etw / 3486 дней назад
@etw Да это было ещё в 2006 на том же Black Hat. https://en.wikipedia.org/wiki/Blue_Pill_%28software%29
#PDWCIO/IBZ / @anonymous --> #PDWCIO/0WX / 3485 дней назад
ipv6 ready BnW для ведрофона BnW на Реформале Викивач Котятки

Цоперайт © 2010-2016 @stiletto.