Hopefully a mod will come along and delete your childish posts again.Same level of quality argument from the troll. Don't you have a bridge to live under?
Please remember that any mention of competitors, hinting at competitors or offering to provide details of competitors will result in an account suspension. The full rules can be found under the 'Terms and Rules' link in the bottom right corner of your screen. Just don't mention competitors in any way, shape or form and you'll be OK.
Hopefully a mod will come along and delete your childish posts again.Same level of quality argument from the troll. Don't you have a bridge to live under?
Did they find all the NSA hacking tools before they leaked? The ones everyone rushed to patch? Including several zero-day exploits.
Hackers are using leaked NSA hacking tools to covertly hijack thousands of computers
https://techcrunch.com/2018/11/28/hackers-nsa-eternalblue-exploit-hijack-computers/
Hopefully just lock the thread.Hopefully a mod will come along and delete your childish posts again.
No one knew about the NSA hacking tools until they leaked. This is my last post by the way. The debate is more or less over. I am sure you need to do something else as well.How do you think companies like Akamai in your link know this stuff is going on? if these RIDL exploits, etc. were as easy to use as you imply we'd see it ongoing by now.
There are lots of zero days exploits running around at any one time, one I remember could just let you take over a windows machine. Why has the world not ended? Why is every desktop systems being compromised left, right and centre....
No one knew about the NSA hacking tools until they leaked. This is my last post by the way. The debate is more or less over. I am sure you need to do something else as well.
I don't disagree and it's why I have investment in firewalls that run into the £20k+ price points and that run IDS, IPS, DLP and other Unified Threat Management features, It's why I proxy port 80 and 443 traffic and also why I use message labs. As well as this it is why I have network based AI (DarkTrace AP) in my security stack and why I have just invested the best part of £100k on new servers and some new layer 3 switches. You know what it's also why I put my job on the line every year by paying professionals big stacks of cash for external pen tests. Why would I do all of this if the internet was a safe place? I don't doubt for a second that zero day vulnerabilities exist but my security stack is deep and well regarded as some of the best tech out there, is it full proff? Hell no but it's robust.
Yes, this is a point I also made previously. Anti-virus researchers have been actively searching for malware in the wild based on these types of side-channel attacks. 18 months on from Spectre and still the only occurrence is the original proof of concept code. Now I am sure there are government agencies, with massive resources, which are researching weaponised versions of these exploits. But, due to the way these exploits work, they will be bespoke and tuned to a specific target. Your average home user is not going to stumble across this whilst casually browsing ads on the Internet.People do however know about RIDL and associated side-channel methods so if they were going on we would know by now and if as easy to turn these proof of concepts into real world viable attacks as you claim they would certainly be in existence by now.
The setup for the ZombieLoad browser snooper does require ideal conditions. First they run a third party tool on the victim machine to reveal CPU core IDs and to determine which are physical and logical. Then the browser and snooping software are launched on the same machine using core affinity to ensure that both are running and locked to the same physical core. Finally they recommend that the CPU is configured to run at a constant maximum frequency with no SpeedStep style variation. They also go on to say that for best chance of success the machine should have a clean reboot before hand, as resume from sleep messes with the timer state.
That’s quite a lot of hard work to snoop on your browsing history. Much easier just to trick the home user into installing some fake browser add-on which will give them complete control over the machine.
I don't disagree and it's why I have investment in firewalls that run into the £20k+ price points and that run IDS, IPS, DLP and other Unified Threat Management features, It's why I proxy port 80 and 443 traffic and also why I use message labs. As well as this it is why I have network based AI (DarkTrace AP) in my security stack and why I have just invested the best part of £100k on new servers and some new layer 3 switches. You know what it's also why I put my job on the line every year by paying professionals big stacks of cash for external pen tests. Why would I do all of this if the internet was a safe place? I don't doubt for a second that zero day vulnerabilities exist but my security stack is deep and well regarded as some of the best tech out there, is it full proff? Hell no but it's robust.
With all this in mind why then do I agree with many of the fundamentals of what people in here are saying? It isn't because I think you don't need security? It's not that at all and security is important, but its equally important to know what the footprint is so you can ensure your security is effective. When you put these fundamentals together you should be able to join up the dots and see things from a broader more reasoned perspective.
That's a pretty fair comment, i don't pretend to understand it which is why i read this thread much more than i participate.
Having said that i don't trust the agenda of a minority of others in here nearly as much as i trust yours.
zx128k none of those scare me, all those presentations were done with local access already granted to a machine.
Its a bit like how one assesses server vulns, you have whats known as local exploits and remote exploits, the former requires some kind of access already to accomplish the exploit hence the term local and by nature will have much lower risk levels, the latter would allow an exploit to be carried out without any existing access to machine so e.g. accessing a web page on a server and then able to get into the server simply from that, obviously much more serious.
If I was to apply the same sort of classification to those examples you posted they would be the equivalent of local exploits.
Now if someone e.g. manages to put on a drive by on the bbc news website that specifically uses this vulnerability, then you have my attention.
Yet all the proof of concept code is being executed with local access on a specially prepared machine. They haven't been able to demonstrate the exploit in JavaScript delivered via a modern browser. Sure, it is possible to write malicious JavaScript, but these exploits require low-level instructions and critical timing, there are limits to what is possible in script, and much simpler attacks that could be used instead.Local access does not matter. Any untrusted code in your browser from a website is a problem too.
Yet all the proof of concept code is being executed with local access on a specially prepared machine. They haven't been able to demonstrate the exploit in JavaScript delivered via a modern browser. Sure, it is possible to write malicious JavaScript, but these exploits require low-level instructions and critical timing, there are limits to what is possible in script, and much simpler attacks that could be used instead.
Are you trolling? does that look like a drive by infection in a web browser to you?
look at the top of the cli, it a locally executed command.
Local access does not matter. Any untrusted code in your browser from a website is a problem too. If you run trusted code its not an issue. Above they have moved on to their last smoke screen which is the noise issue which the white paper states they had to overcome in their password attack. Ignoring proof of concept is not a great debating position.
See sync section in the RIDL document. page 7 & 8. https://mdsattacks.com/files/ridl.pdf
"For this purpose, we show a noise-resilient mask-sub-rotate attack technique that leaks 8 bytes from a given index at a time.
As shows in Figure7,1suppose we already know part of the bytes we want to leak (either by leaking them first or knowing them through some other means).2In the speculative path we can mask the bytes that we do not know yet.3By subtracting the known value,4and then rotating by 16 bytes, values that are not consistent with previous observations will be out of bounds in our Flush + Reload buffer, meaning we do not leak them. This technique greatly improves the observed signal.We use this technique to develop an exploit on Linux that is able to leak the contents of the/etc/shadow file. Our approach involves repeatedly invoking the privileged passwd program from an unprivileged user. As a result the privileged process opens and reads the/etc/shadow file, that ordinary users cannot access otherwise. Since we cannot modify the victim to introduce a synchronization point, we repeatedly run the program and try to leak the LFB while the program reads the/etc/shadow file. By applying our previously discussed technique, with the additional heuristic that the leaked byte must be a printable ASCII character, we are able to leak the contents of the file even with the induced noise from creating processes."
You are overlooking two crucial factors in how they overcame the noise issue - they made their victim process repeatedly store the "secret" data they are after and made sure the victim process would be where their attack needed it to be to leak data by controlling the local environment - they also started with a considerably cleaner environment than a typical desktop system where a lot more arbitrary data would be coming and going from the buffers. This isn't how privileged information works in the real world - in some cases it might be possible to force those circumstances when you have one foot in the door like a shared server environment.
Fact 1: They used a timer which has been disabled in modern browsers.
Fact 2: They couldn't make it work in Chrome (don't mention any other browsers).
Fact 3: They ran the taskset command locally to lock both the victim and attack processes to a specific CPU core (i.e. specially prepared environment). The don't show how they determined the core IDs but I would imagine it was executing lscpu locally beforehand.