AntiVirus 板


LINE

※ [本文轉錄自 hardware 看板] 作者: coolcliff01 (神阿..好你個死人頭) 看板: hardware 標題: [News] 無差別攻擊 intel CPU Bug將導致遠程代碼攻擊 時間: Wed Jul 16 15:44:58 2008 轉載自 http://tinyurl.com/5n9v95 這是一個intel CPU的漏洞所導致的一個弱點! 可能會被用來進行遠端攻擊,受影響的作業系統為"任何" 這是一種很有趣的攻擊方式 是針對特定硬體的而來的弱點攻擊!而且沒有限定作業系統 不管是Windows,Linux,BSD等都有可能經由這個弱點被攻擊! 而Kris Kaspersky(Kaspersky安全研究員)表示他計劃將在今年10月所舉行的HITB 展示這個弱點攻擊,並說明如何利用CPU Bug來達攻擊的目的! ***************************************************************** Presentation Title: Remote Code Execution Through Intel CPU Bugs Presentation Abstract: According to the Intel Specification Updates, Intel Core 2 has 128 confirmed bugs. Intel Itanium (designed for critical systems) looks more 「promising」, carrying over 230 bugs. They have all been confirmed by Intel and described in errata section of their specification updates. Some bugs 「just」 crash the system (under quite rare conditions) while the others give the attackers full control over the machine. In other words, Intel CPUs have exploitable bugs which are vulnerable to both local and remote attacks which works against any OS regardless of the patches applied or the applications which are running. Although CPU bugs are not something new in the security industry, nobody has come out with any proof-of-concept exploits and as it stands, there are no known malware that take advantage of these bugs, although some malware writers have actually used CPU bugs for targeted attacks. It is just a matter of time before we start seeing these sort of attacks used in more devastating ways over the Internet. Intel has provided workarounds to major BIOS vendors for some of these bugs, but who knows which vendor actually uses them? End-users are in the dark as to how to check if they are secure or not. Intel doesn't provide any test program for this and the worst thing is - some bugs are still not fixed. In other words, Intel has no workaround for it. In this presentation, I will share with the participants the finding of my CPU malware detection research which was funded by Endeavor Security. I will also present to the participants my improved POC code and will show participants how it's possible to make an attack via JavaScript code or just TCP/IP packets storms against Intel based machine. Some of the bugs that will be shown are exploitable via common instruction sequences and by knowing the mechanics behind certain JIT Java-compilers, attackers can force the compiler to do what they want (for example: short nested loops lead to system crashes on many CPUs). I will also share with the participants my experience in data recovery and how CPU bugs have actually contributed in damaging our hard drives without our knowledge. About Kris Kris Kaspersky has over 15 years of software engineering and reverse engineering experience in CD/DVD protections, PE/ELF packers/protectors, CD/DVD copiers, audio/video codecs (MPEG 1/MPEG 2/MPEG 4), data flow optimization, CPU-specific optimization, compiler specific optimization, debugging code and much more. As an independent consultant and technical writer, Kris has been an active researcher in the field of reverse engineering and pretty much dedicated his daily life in mastering the art. He possesses a deep knowledge in OS internals and low level ASM. He is also the author for Xakep magazine and has published more than 20 books about system programming. The titles of his English publications are below: * Hacker Disassembling Uncovered: Powerful Techniques To Safeguard Your Programming (ISBN: 1931769222); * Hacker Disassembling Uncovered: Second Edition, totally rewritten (ISBN-10: 1931769648); * CD Cracking Uncovered: Protection Against Unsanctioned CD Copying (ISBN-10: 1931769338); * Data Recovery: Tips and Solutions: Windows, Linux, and BSD (ISBN-10: 1931769567); * Code Optimization: Effective Memory Usage (ISBN-10: 1931769249); * Shellcoder's Programming Uncovered (ISBN-10: 193176946X); * Hacker Debugging Uncovered (ISBN-10: 1931769400) --



※ 發信站: 批踢踢實業坊(ptt.cc)
◆ From: 218.169.80.248
1F:推 denix:這個人是天才嗎? 07/16 16:23
2F:推 fantasiaa:AMD會出來補刀嗎? 07/16 16:34
3F:推 MOONRAKER:FDIV bug重現江湖? 07/16 16:36
4F:→ MOONRAKER:(當然,FDIV比這輕鬆多了) 07/16 16:37
5F:→ sohate5566:還好我用AMD(茶ing) 07/16 16:38
6F:→ loudness:結果發現AMD處理器有更多Bug可以攻擊XDDDDDD 07/16 17:02
7F:推 CloudJ:intel的反擊方法: 出資找更多駭客來找AMD的bug XD 07/16 17:34
※ 編輯: coolcliff01 來自: 218.169.94.126 (07/16 18:16) --



※ 發信站: 批踢踢實業坊(ptt.cc)
◆ From: 122.117.170.99
8F:推 YTsungL:很好, 很強大 07/16 20:14
9F:推 junorn:讓我想到mj001那邊他自己號稱自己研發的 07/16 21:03
10F:→ junorn:隱藏式Boot加載,他的說法是不感染MBR\BootSector\Ntldr 07/16 21:04
11F:→ junorn:、新增任何文件,即使使用WinPe或將硬盤拆下亦無法檢查出 07/16 21:04
12F:→ junorn:來的BootKit啟動模式 07/16 21:04
13F:→ junorn:不知道怎麼做到的.... 07/16 21:05
14F:推 final01:這個卡巴斯基很有名 07/17 00:33







like.gif 您可能會有興趣的文章
icon.png[問題/行為] 貓晚上進房間會不會有憋尿問題
icon.pngRe: [閒聊] 選了錯誤的女孩成為魔法少女 XDDDDDDDDDD
icon.png[正妹] 瑞典 一張
icon.png[心得] EMS高領長版毛衣.墨小樓MC1002
icon.png[分享] 丹龍隔熱紙GE55+33+22
icon.png[問題] 清洗洗衣機
icon.png[尋物] 窗台下的空間
icon.png[閒聊] 双極の女神1 木魔爵
icon.png[售車] 新竹 1997 march 1297cc 白色 四門
icon.png[討論] 能從照片感受到攝影者心情嗎
icon.png[狂賀] 賀賀賀賀 賀!島村卯月!總選舉NO.1
icon.png[難過] 羨慕白皮膚的女生
icon.png閱讀文章
icon.png[黑特]
icon.png[問題] SBK S1安裝於安全帽位置
icon.png[分享] 舊woo100絕版開箱!!
icon.pngRe: [無言] 關於小包衛生紙
icon.png[開箱] E5-2683V3 RX480Strix 快睿C1 簡單測試
icon.png[心得] 蒼の海賊龍 地獄 執行者16PT
icon.png[售車] 1999年Virage iO 1.8EXi
icon.png[心得] 挑戰33 LV10 獅子座pt solo
icon.png[閒聊] 手把手教你不被桶之新手主購教學
icon.png[分享] Civic Type R 量產版官方照無預警流出
icon.png[售車] Golf 4 2.0 銀色 自排
icon.png[出售] Graco提籃汽座(有底座)2000元誠可議
icon.png[問題] 請問補牙材質掉了還能再補嗎?(台中半年內
icon.png[問題] 44th 單曲 生寫竟然都給重複的啊啊!
icon.png[心得] 華南紅卡/icash 核卡
icon.png[問題] 拔牙矯正這樣正常嗎
icon.png[贈送] 老莫高業 初業 102年版
icon.png[情報] 三大行動支付 本季掀戰火
icon.png[寶寶] 博客來Amos水蠟筆5/1特價五折
icon.pngRe: [心得] 新鮮人一些面試分享
icon.png[心得] 蒼の海賊龍 地獄 麒麟25PT
icon.pngRe: [閒聊] (君の名は。雷慎入) 君名二創漫畫翻譯
icon.pngRe: [閒聊] OGN中場影片:失蹤人口局 (英文字幕)
icon.png[問題] 台灣大哥大4G訊號差
icon.png[出售] [全國]全新千尋侘草LED燈, 水草

請輸入看板名稱,例如:iOS站內搜尋

TOP