xen   6893

« earlier    

Win 7, Server 2008 'Total Meltdown' exploit lands, pops admin shells • The Register
Create a new set of page tables which will allow access to any physical memory address;
Create a set of signatures which can be used to hunt for _EPROCESS structures in kernel memory;
Find the _EPROCESS memory address for our executing process, and for the System process; and
Replace the token of our executing process with that of System, elevating us to NT AUTHORITY\System.
microsoft  meltdown  vulnerability  exploit  xen 
april 2018 by bwiese

« earlier    

related tags

agl  archlinux  arm  arm64  asian  availability  aws  backup  bhyve  binary  blog  bookmarks_toolbar  booting  bootloader  bsd  bugs  c3  carti  cloud  coink  compiler  computer  configuration  containers  craig  datacenter  devops  docker  documentation  domu  download  drivers  elixir  embedded  erlang  exokernel  exploit  faq  floss  ford  freebsd  golang  guy  ha  high  hip  homelab  hop  hyper-v  hyperconverged  hypervisor  hypervisors  ifttt  info  ip  kernel  kernelmodule  kickstarter  kvm  libvirt  linux  lvm  lxc  meltdown  meta  microsoft  networking  no.os  ocaml  opensource  openstack  openvswitch  operating  operatingsystem  operations  os  oss  paper  pink  pizza  playboy  plugin  privacy  programming  public_bookmarks  python  qemu  qubes  raff  rap  raspberrypi  reference  riff  rock64  rootkovska  router  rsnapshot  rsync  secure  security  server  sgx  sle  snapshot  snowden  spectre  sysadmin  system  systems  tids  tips  troubleshooting  uboot  ubuntu  unikernel  vagrant  virt-builder  virtual  virtualisation  virtualization  vm  vmdp  vms  vmware  vtd  vulnerability  webui  whonix  wikientry  windows  windowserver  wordpress  work  xcp  xenserver  yocto 

Copy this bookmark: