Get in touch now on

+61 7 3480 5121

Blog
Meltdown Exploits PoC.
06 January, 2018
This post was originally published on this site

Meltdown Exploit PoC is a Speculative optimizations execute code in a non-secure manner leaving data traces in microarchitecture such as cache.

How it works?
It works by using /proc/kallsyms to find system call table and checking whether the address of a system call found by exploiting MELTDOWN match the respective one in /proc/kallsyms.
What to do when you face this error “Unable to read /proc/kallsyms…”

meltdown-exploit

That’s because your system may be preventing the program from reading kernel symbols in /proc/kallsyms due to /proc/sys/kernel/kptr_restrict set to 1. The following command will do the tricky:

sudo sh -c “echo 0 > /proc/sys/kernel/kptr_restrict” sudo sh -c “echo 0 > /proc/sys/kernel/kptr_restrict”

Use or Run:

git clone https://github.com/paboldin/meltdown-exploit && cd meltdown-exploit make ./run.sh git clone https://github.com/paboldin/meltdown-exploit && cd meltdown-exploit

Source: https://github.com/paboldin

read more ...

What our
Clients say

Product Finder

Search for products that match of these criteria:

 + Add row
Price:
System Diagnostic

  • Do you have five or more computers?
  • Do you have a server?
  • Is your data critical to your business?
  • Do you think IT could perform better?
  • Are you concerned about your IT security?
  • Do you need to be kept up to date?
  • Would you like your IT maintained?
Product Finder

Search for products that match of these criteria:

 + Add row
Price:

FREE UPDATES



CONTACT US

Phone:07 3480 5121

Address: 8 - 37 Flinders Parade, North Lakes

QLD 4509 Australia

Post: PO Box 128, Burpengary

QLD 4505 Australia