You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
My box runs a custom-built Gentoo hardened monolithic kernel with most GRSEC protections enabled (so root doesn't see /proc/kallsyms), but no SELinux or other MAC. It also does not have /boot mounted while running (because i have KASLR enabled).
I already know from Intel's list of affected CPU that my Ivybridge i7 exhibits the behaviour, that is exploited by Meltdown.
But it would be nice to know, whether exploiting the bug on my system would need a tailored exploit in practice or if a further improved generic exploit could do it.
The text was updated successfully, but these errors were encountered:
It's said that meltdown can be used to bypass KASLR, and from there, we could figure out some places in kernel which would allows us to check it. Remove the dependency on /proc/kallsyms will be a great achievement for this project
Why rely on external information/ bypass KASLR? We could inject a small module which either provides some "strings" to find or it can dump the current address of the syscall table.
Injecting some strings is probably easier than the second idea. I implemented the extraction of the address of the syscall table for a PoC/training rootkit some years ago. Unfortunately the pattern I used to match within the syscall handler is not valid any more. The old code is uploaded here.
Very good idea @bw0x00. I'll add it to my list of things to do. I could add a run script that will guide the user through it if it finds /proc/kallsyms cannot be used.
My box runs a custom-built Gentoo hardened monolithic kernel with most GRSEC protections enabled (so root doesn't see /proc/kallsyms), but no SELinux or other MAC. It also does not have /boot mounted while running (because i have KASLR enabled).
I already know from Intel's list of affected CPU that my Ivybridge i7 exhibits the behaviour, that is exploited by Meltdown.
But it would be nice to know, whether exploiting the bug on my system would need a tailored exploit in practice or if a further improved generic exploit could do it.
The text was updated successfully, but these errors were encountered: