Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Locked thread
Wiggly Wayne DDS
Sep 11, 2010



BangersInMyKnickers posted:

Has anyone come up with a way to detect the microcode support for Spectre mitigation on Windows besides the powershell module? My SCCM guys aren't pushing powershell version upgrades so I have a mixed bag of 5.1/5.0/4/3 and I think 5+ added the install-module cmdlet.
https://twitter.com/epakskape/status/949503467948683264

see the "PowerShell Verification using a download from Technet (Earlier OS versions/Earlier WMF versions)"
https://support.microsoft.com/en-us/help/4072698/windows-server-guidance-to-protect-against-the-speculative-execution

also an update on triton https://www.midnightbluelabs.com/blog/2018/1/16/analyzing-the-triton-industrial-malware

Adbot
ADBOT LOVES YOU

Wiggly Wayne DDS
Sep 11, 2010



i'm not a fan of bumping but it's feasible on that:

https://www.youtube.com/watch?v=H4f1H6mYHOI

at least in theory:

https://www.youtube.com/watch?v=nO1zkWKK5dA

e: lot more info on a practical attack: https://enterthecore.net/foiling-the-forever-lock-by-deviant-ollam/

Wiggly Wayne DDS fucked around with this message at 17:48 on Jan 17, 2018

Wiggly Wayne DDS
Sep 11, 2010



no details, claims of it being researched due to spectre/meltdown (so they saw those being released and in 2 weeks found new applicable attacks, did a comprehensive review, alerted companies, got pr ready, etc?), and no one's willing to back up the claims when asked about it:

https://twitter.com/josephfcox/status/954035036898160642

Wiggly Wayne DDS
Sep 11, 2010



well what else happened, don't keep us in suspense

Wiggly Wayne DDS
Sep 11, 2010



they're right next to the rowhammer in-the-wild attacks

Wiggly Wayne DDS
Sep 11, 2010



it is exceedingly unlikely and would be out of the norm given that rowhammer attacks are more potent, yet don't have any end-user relevant attacks going around.

end of the day spectre+meltdown are read-only info disclosures. it'd be nice as a technique for escalating your rce, but on its own it's reliant on there being interesting memory on the device to read and being actively manipulated at the time of attack. servers care as they have private keys and external services that can be leveraged further combined with means of manipulating those independent processes. end users aren't likely to have a ssh server running to pivot to, or an access method outside of a browser. the most dangerous scenario then is an extremely motivated attacker knows the system inside-out, which password manager is running and gets them onto a site - while the password manager is handling passwords in memory - and uses that to access external services, but 2fa exists as do in-depth mitigations on the browser itself.

really all history has shown is that criminal groups are incredibly slow to adopt to new exploit techniques, and your nation state attackers would rather not have that white elephant of a vuln sitting in their systems as well. there's a strange misconception on the quantity of black hat attackers producing malware, their development processes and sophistication. really that is a topic in dire need of analysis because the reality really doesn't add up to the expectation of competency there, even accounting for nsa exploits being released and turnaround time for those being used outside of targeted attacks

Wiggly Wayne DDS
Sep 11, 2010



good luck developing your patches in secret, tested extremely thoroughly across all possible permutations, and not waiting a decade to get them released. despite all the complaints given the wide scope and everyone rushing to patch this has gone over rather smoothly

Wiggly Wayne DDS
Sep 11, 2010



i'm pretty sure this still counts as a sec fuckup: https://www.washingtonpost.com/loca...097e_story.html

quote:

After his arrest last Jan. 31, Wertkin returned to Washington to clean out his Akin Gump office near Dupont Circle, where he removed and destroyed electronic and paper copies of other stolen cases “that I knew could further incriminate me,” he said in plea papers.

Wiggly Wayne DDS
Sep 11, 2010



welcome to procurement?

Wiggly Wayne DDS
Sep 11, 2010



i'm this entire thread
https://twitter.com/tobiaschneider/status/957317886112124928

Wiggly Wayne DDS
Sep 11, 2010



it was around earlier
e:


thanks for not removing them from the server twitter

Wiggly Wayne DDS fucked around with this message at 01:24 on Jan 28, 2018

Wiggly Wayne DDS
Sep 11, 2010



no one told osint about it

Wiggly Wayne DDS
Sep 11, 2010



it's just metadata what's the harm

Wiggly Wayne DDS
Sep 11, 2010



korean dmz is also fun

Wiggly Wayne DDS
Sep 11, 2010



at least the data is in a vacuum and isn't being corroborated by people who were at the bases:

https://twitter.com/svblxyz/status/957703976014761984

Adbot
ADBOT LOVES YOU

Wiggly Wayne DDS
Sep 11, 2010



military has policies on these devices anyway, it's lack of enforcement and exemptions

  • Locked thread