Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦π΅οΈWhat you need for Anonymity and security ?
1) Setting up the working environment. Improved and revised work with virtual machines (perhaps the only analogy with the previous course);
2) Fine work with different cryptocurrencies;
3) Selection, rental, administration and protection of VPS (70% of the work in the course takes place on servers);
4) Lifting and configuring services on VPS and working with them;
5) Fine work with Tor services;
6) Squeezing the maximum out of the Raspberry Pi;
7) Anonymous routers;
8) Lifting, configuring and administering the Tor node;
9) Work with PC hardware. Removing hardware bookmarks;
10) Risk minimization and ... authoring.
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦π΅οΈWhat you need for Anonymity and security ?
1) Setting up the working environment. Improved and revised work with virtual machines (perhaps the only analogy with the previous course);
2) Fine work with different cryptocurrencies;
3) Selection, rental, administration and protection of VPS (70% of the work in the course takes place on servers);
4) Lifting and configuring services on VPS and working with them;
5) Fine work with Tor services;
6) Squeezing the maximum out of the Raspberry Pi;
7) Anonymous routers;
8) Lifting, configuring and administering the Tor node;
9) Work with PC hardware. Removing hardware bookmarks;
10) Risk minimization and ... authoring.
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦VECTOR IN C++:
#FastTips
1) Assigning a Vector during Construction
During construction, an empty vector can be created while another one is assigned to it, as follows:
vector <float> vtr1{1.1, 2.2, 3.3, 4.4};
vector <float> vtr2 =vtr1;
2) The second statement is equivalent to:
vector <float> vtr2 = {1.1, 2.2, 3.3, 4.4};
const Vector
3) A const vector is a vector whose elements cannot be changed. The values in this vector are read-only. When created, the vector appears as follows:
const vector <float> vtr{1.1, 2.2, 3.3, 4.4};
4) In this vector type, no element can be added or removed. Moreover, no value can be changed.
π¦Constructing with Iterator
1) A template provides a generic representation for a data type. An iterator provides a generic representation of scanning through the values of a container. The syntax to create a vector with an iterator is as follows:
template<class InputIterator>
vector(InputIterator first, InputIterator last,const Allocator& = Allocator());
2) This constructs a vector for the range [first, last) using the specified allocator, which will be discussed later in this article.
3) Destroying a Vector
To destroy a vector, simply allow it to go out of scope and destroy is handled automatically.
Vector Capacity
size_type capacity() const noexcept
4) The total number of elements the vector can hold without requiring reallocation is returned by the capacity member function. A code segment for this is as follows:
vector <float> vtr(4);
int num = vtr.capacity();
cout << num << '\n';
The output is 4.
reserve(n)
5) Memory space is not always freely available. Extra space can be reserved in advance. Consider the following code segment:
vector <float> vtr(4);
vtr.reserve(6);
cout << vtr.capacity() << '\n';
6) The output is 6. So, the extra space reserved is 6 β 4 = 2 elements. The function returns void.
size() const noexcept
This returns the number of elements in the vector. The following code illustrates this function:
vector <float> vtr(4);
float sz = vtr.size();
cout << sz << '\n';
The output is 4.
shrink_to_fit()
After giving extra capacity to a vector with the reserve() function, the vector can be sized down to fit to its original size. The following code illustrates this:
vector <float> vtr(4);
vtr.reserve(6);
vtr.shrink_to_fit();
int sz = vtr.size();
cout << sz << '\n';
The output is 4 and not 6. The function returns void.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦VECTOR IN C++:
#FastTips
1) Assigning a Vector during Construction
During construction, an empty vector can be created while another one is assigned to it, as follows:
vector <float> vtr1{1.1, 2.2, 3.3, 4.4};
vector <float> vtr2 =vtr1;
2) The second statement is equivalent to:
vector <float> vtr2 = {1.1, 2.2, 3.3, 4.4};
const Vector
3) A const vector is a vector whose elements cannot be changed. The values in this vector are read-only. When created, the vector appears as follows:
const vector <float> vtr{1.1, 2.2, 3.3, 4.4};
4) In this vector type, no element can be added or removed. Moreover, no value can be changed.
π¦Constructing with Iterator
1) A template provides a generic representation for a data type. An iterator provides a generic representation of scanning through the values of a container. The syntax to create a vector with an iterator is as follows:
template<class InputIterator>
vector(InputIterator first, InputIterator last,const Allocator& = Allocator());
2) This constructs a vector for the range [first, last) using the specified allocator, which will be discussed later in this article.
3) Destroying a Vector
To destroy a vector, simply allow it to go out of scope and destroy is handled automatically.
Vector Capacity
size_type capacity() const noexcept
4) The total number of elements the vector can hold without requiring reallocation is returned by the capacity member function. A code segment for this is as follows:
vector <float> vtr(4);
int num = vtr.capacity();
cout << num << '\n';
The output is 4.
reserve(n)
5) Memory space is not always freely available. Extra space can be reserved in advance. Consider the following code segment:
vector <float> vtr(4);
vtr.reserve(6);
cout << vtr.capacity() << '\n';
6) The output is 6. So, the extra space reserved is 6 β 4 = 2 elements. The function returns void.
size() const noexcept
This returns the number of elements in the vector. The following code illustrates this function:
vector <float> vtr(4);
float sz = vtr.size();
cout << sz << '\n';
The output is 4.
shrink_to_fit()
After giving extra capacity to a vector with the reserve() function, the vector can be sized down to fit to its original size. The following code illustrates this:
vector <float> vtr(4);
vtr.reserve(6);
vtr.shrink_to_fit();
int sz = vtr.size();
cout << sz << '\n';
The output is 4 and not 6. The function returns void.
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Best free Vpn for ios & android :
https://www.hotspotshield.com/
https://windscribe.com/?affid=epro71l0&utm_source=cmp2&utm_medium=cmp2&utm_campaign=cmp2&utm_term=cmp2&utm_content=cmp2
https://www.betternet.co (fake reviews isnβt real)
https://itunes.apple.com/in/app/vpn-master-free-unblock-proxy/id1025707485?mt=8
https://itunes.apple.com/fi/app/touchvpn-unlimited-proxy/id991744383?mt=8
TOP RATED ONE, much more vpn, but those free & high rated
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Best free Vpn for ios & android :
https://www.hotspotshield.com/
https://windscribe.com/?affid=epro71l0&utm_source=cmp2&utm_medium=cmp2&utm_campaign=cmp2&utm_term=cmp2&utm_content=cmp2
https://www.betternet.co (fake reviews isnβt real)
https://itunes.apple.com/in/app/vpn-master-free-unblock-proxy/id1025707485?mt=8
https://itunes.apple.com/fi/app/touchvpn-unlimited-proxy/id991744383?mt=8
TOP RATED ONE, much more vpn, but those free & high rated
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Hotspotshield
Hotspot Shield: Fastest VPN for Streaming, Gaming & More
Hotspot Shield is the leading VPN for online security and verified as #1 VPN for speed by experts. Download VPN for Windows, Mac, Android, iOS & more.
Forwarded from UNDERCODE NEWS
Now The vulnerability is patched !! world's second largest browser new version released: fix fatal bugs, no longer stuck
#Updates #Vulnerabilities.
#Updates #Vulnerabilities.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How do hackers usually invade our computers? How to prevent hacking? What precautions should be done?
Answer: The so-called disease comes from the mouth. Hackers must enter the "port" of the computer first. The "port" of the computer here refers to the port. We know that the communication between the computer and the Internet is to transmit data through the port, whether it is normal data or the data generated by hackers, without exception, it needs to pass through the port. Therefore, as long as we block the dangerous port of a computer, it will be very difficult for hackers to invade our computer. Let us learn how to close the computer port.
π¦What is a port?
The port is a way for the computer to communicate with the outside, and the computer needs it to communicate with the outside world. The server uses different ports to provide different services, so only one IP address is needed to receive different data packets. Because of the port, when a data packet arrives at the computer, it knows which data packet to send to which service program. Therefore, through different ports, the computer and the outside world can communicate without interference. Simply put, a port is like a door. Only when we open this door can the computer communicate with the outside world. All data must pass through the door to enter our system. For example, the well-known "Blast Wave" and "Magic Wave" viruses spread through ports 139 and 445, while the famous Trojan "Glacier" controls our computer through port 7626. Therefore, as long as we understand some ports commonly used by virus and Trojan horses and close them, we can avoid many virus and Trojan horse attacks.
A) Use the system's own function to close the port
Closing the system port is not an advanced technology. Windows has a built-in port management function, but we rarely use it. This function is called "TCP/IP filtering".
1) Enter "Control Panel" β "Network Connections". We can find a "local connection" in it, right-click on the "local connection", select "properties", and then the properties window will appear.
2) In the center of the window, there is an option of "This connection uses the following selected components", in which you can find "Internet Protocol (TCP/IP)", select it and click the right mouse button again, and click " Advanced" button to enter advanced TCP/IP settings. Switch to the "Options" tab, you can find our protagonist "TCP/IP Filtering" in the "Optional Settings". Double-click "TCP/IP Filtering" to set it.
3) IP FILTERING
B) Network firewalls
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How do hackers usually invade our computers? How to prevent hacking? What precautions should be done?
Answer: The so-called disease comes from the mouth. Hackers must enter the "port" of the computer first. The "port" of the computer here refers to the port. We know that the communication between the computer and the Internet is to transmit data through the port, whether it is normal data or the data generated by hackers, without exception, it needs to pass through the port. Therefore, as long as we block the dangerous port of a computer, it will be very difficult for hackers to invade our computer. Let us learn how to close the computer port.
π¦What is a port?
The port is a way for the computer to communicate with the outside, and the computer needs it to communicate with the outside world. The server uses different ports to provide different services, so only one IP address is needed to receive different data packets. Because of the port, when a data packet arrives at the computer, it knows which data packet to send to which service program. Therefore, through different ports, the computer and the outside world can communicate without interference. Simply put, a port is like a door. Only when we open this door can the computer communicate with the outside world. All data must pass through the door to enter our system. For example, the well-known "Blast Wave" and "Magic Wave" viruses spread through ports 139 and 445, while the famous Trojan "Glacier" controls our computer through port 7626. Therefore, as long as we understand some ports commonly used by virus and Trojan horses and close them, we can avoid many virus and Trojan horse attacks.
A) Use the system's own function to close the port
Closing the system port is not an advanced technology. Windows has a built-in port management function, but we rarely use it. This function is called "TCP/IP filtering".
1) Enter "Control Panel" β "Network Connections". We can find a "local connection" in it, right-click on the "local connection", select "properties", and then the properties window will appear.
2) In the center of the window, there is an option of "This connection uses the following selected components", in which you can find "Internet Protocol (TCP/IP)", select it and click the right mouse button again, and click " Advanced" button to enter advanced TCP/IP settings. Switch to the "Options" tab, you can find our protagonist "TCP/IP Filtering" in the "Optional Settings". Double-click "TCP/IP Filtering" to set it.
3) IP FILTERING
B) Network firewalls
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦UNDETECTABLE KEYLOGGER VIA IMAGE 2020 UPDATE since 2 years :
Keylogger is 100% invisible keylogger not only for users, but also undetectable by antivirus software. Keylogger Monitors all keystokes, Mouse clicks. It has a seperate process which continues capture system screenshot and send to ftp server in given time.
F E A T U R E S :
1) Discrete/Tamper Proof :By design, Advance Keylogger is undetectable ad thus cannot be tampered with or removed by kids/employees (who are often tech savvy). It does not appear in the Registry, the Process List, the System Tray, the Task Manager, on the Desktop, or in the Add/Remove programs.
2) Keystrokes Typed: See every keystroke typed even if it is deleted. This keystroke logger feature provides a reader-friendly version of all keystrokes logged along with the raw keylogging activity so you can see every detail.
3) Continuous Screenshots: Video-style playback of screenshots for programs and websites selected by you. For example, watch an email as it's being typed and edited instead of just seeing the finished product (1,000 screenshots included with purchase).
4) FTP Server: Screenshot and keylogger Logfile which contain senstive user information send to ftp server (Mobile/Web/System). Powerful ftp server also write in Core Visual C++.
5) AutoStart : Keylogger has functionaility to auto execute on system bootup. It Insert entry on system startup program when it is running.
6) AutoCopy : Keylogger has functionaility to auto copy in %appdata%/roaming/wpdnse/ folder.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) download https://github.com/ajayrandhawa/Keylogger
2) Now you have two main files:
Keylogger.Zip Contain two Executable Files. (Sourcecode File Also Included)
a) svchost.exe (Main Keylogger Processs)
b) rundll33.exe (Capture Screenshot & send all Log and Screenshot to FTP Server (ftp://192.168.8.2:2121))
3) Execute both files once time next time its automatically start and capture screenshot and keylog.
4) These names Given for unrecognisable in Task Manager.
π§ββοΈHow to Use ?
5) Start FTP Server on This Ip Address 192.168.8.2:2121
and Start both program and Enjoy
- USE FOR LEARN ONLY !!!
»» IF YOU A SUPER BEGINER, CHECK MORE INFO https://github.com/ajayrandhawa/Keylogger««
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦UNDETECTABLE KEYLOGGER VIA IMAGE 2020 UPDATE since 2 years :
Keylogger is 100% invisible keylogger not only for users, but also undetectable by antivirus software. Keylogger Monitors all keystokes, Mouse clicks. It has a seperate process which continues capture system screenshot and send to ftp server in given time.
F E A T U R E S :
1) Discrete/Tamper Proof :By design, Advance Keylogger is undetectable ad thus cannot be tampered with or removed by kids/employees (who are often tech savvy). It does not appear in the Registry, the Process List, the System Tray, the Task Manager, on the Desktop, or in the Add/Remove programs.
2) Keystrokes Typed: See every keystroke typed even if it is deleted. This keystroke logger feature provides a reader-friendly version of all keystrokes logged along with the raw keylogging activity so you can see every detail.
3) Continuous Screenshots: Video-style playback of screenshots for programs and websites selected by you. For example, watch an email as it's being typed and edited instead of just seeing the finished product (1,000 screenshots included with purchase).
4) FTP Server: Screenshot and keylogger Logfile which contain senstive user information send to ftp server (Mobile/Web/System). Powerful ftp server also write in Core Visual C++.
5) AutoStart : Keylogger has functionaility to auto execute on system bootup. It Insert entry on system startup program when it is running.
6) AutoCopy : Keylogger has functionaility to auto copy in %appdata%/roaming/wpdnse/ folder.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) download https://github.com/ajayrandhawa/Keylogger
2) Now you have two main files:
Keylogger.Zip Contain two Executable Files. (Sourcecode File Also Included)
a) svchost.exe (Main Keylogger Processs)
b) rundll33.exe (Capture Screenshot & send all Log and Screenshot to FTP Server (ftp://192.168.8.2:2121))
3) Execute both files once time next time its automatically start and capture screenshot and keylog.
4) These names Given for unrecognisable in Task Manager.
π§ββοΈHow to Use ?
5) Start FTP Server on This Ip Address 192.168.8.2:2121
and Start both program and Enjoy
- USE FOR LEARN ONLY !!!
»» IF YOU A SUPER BEGINER, CHECK MORE INFO https://github.com/ajayrandhawa/Keylogger««
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - ajayrandhawa/Keylogger: Keylogger is 100% invisible keylogger not only for users, but also undetectable by antivirus software.β¦
Keylogger is 100% invisible keylogger not only for users, but also undetectable by antivirus software. keylogger Monitors all keystokes, Mouse clicks. It has a seperate process which continues capt...
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦https encryption is also cracked HEIST attack to obtain plaintext from encrypted data :
#fastTips
we know the difference between http and https. For encrypted https, we always think it is relatively safe, but today we are going to talk about a web attack that bypasses HTTPS encryption to obtain plaintext information. I donβt know this. The news is happy or sad for you
1) The conditions for the use of the HEIST attack are very simple, requiring only a few lines of simple javascript code, and no man-in-the-middle attack is required. First, the transmitted sensitive data will be captured and saved. This attack method can obtain private sensitive information such as bank card number, real name, phone number, and social security number.
2) But as we all know, most of these data are encrypted by HTTPS. Then make a probe on the size and length of the encrypted data. Many websites use file compression technology to increase the loading speed of web pages, and attackers can just use the design flaws to decrypt the data payload (similar to BREACH attacks and CRIME attacks).
3) HEIST technology can use new APIs (Resource Timing and Fetch) to calculate the number of transmission frames and windows sent by the target host. Throughout the process, researchers can use a piece of JavaScript code to determine the actual size of the HTTPS response message. Then, the malicious HEIST code can cooperate with the BREACH technology to extract the encrypted information from the user's request data.
4) security researchers will demonstrate how to use malicious advertisements on the New York Times official website to accurately measure the size of the encrypted response information. Throughout the process, security researchers will use a virtual third-party website (targetwebsite.com) to send encrypted information. In addition, they will also demonstrate how to infer data information from security tokens used to prevent cross-site request forgery attacks.
5) Although some websites currently deploy basic security measures, most of them cannot prevent HEIST attacks, so this type of attack may become more frequent in recent years. The current prevention methods for HEIST attacks are to either disable third-party cookies or javascript scripts. But third-party cookies and javascript are the basic requirements for ordinary users to access the web, so the two researchers also hope to find and develop a reasonable and effective solution together through the Black Hat conference.
#FastTips
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦https encryption is also cracked HEIST attack to obtain plaintext from encrypted data :
#fastTips
we know the difference between http and https. For encrypted https, we always think it is relatively safe, but today we are going to talk about a web attack that bypasses HTTPS encryption to obtain plaintext information. I donβt know this. The news is happy or sad for you
1) The conditions for the use of the HEIST attack are very simple, requiring only a few lines of simple javascript code, and no man-in-the-middle attack is required. First, the transmitted sensitive data will be captured and saved. This attack method can obtain private sensitive information such as bank card number, real name, phone number, and social security number.
2) But as we all know, most of these data are encrypted by HTTPS. Then make a probe on the size and length of the encrypted data. Many websites use file compression technology to increase the loading speed of web pages, and attackers can just use the design flaws to decrypt the data payload (similar to BREACH attacks and CRIME attacks).
3) HEIST technology can use new APIs (Resource Timing and Fetch) to calculate the number of transmission frames and windows sent by the target host. Throughout the process, researchers can use a piece of JavaScript code to determine the actual size of the HTTPS response message. Then, the malicious HEIST code can cooperate with the BREACH technology to extract the encrypted information from the user's request data.
4) security researchers will demonstrate how to use malicious advertisements on the New York Times official website to accurately measure the size of the encrypted response information. Throughout the process, security researchers will use a virtual third-party website (targetwebsite.com) to send encrypted information. In addition, they will also demonstrate how to infer data information from security tokens used to prevent cross-site request forgery attacks.
5) Although some websites currently deploy basic security measures, most of them cannot prevent HEIST attacks, so this type of attack may become more frequent in recent years. The current prevention methods for HEIST attacks are to either disable third-party cookies or javascript scripts. But third-party cookies and javascript are the basic requirements for ordinary users to access the web, so the two researchers also hope to find and develop a reasonable and effective solution together through the Black Hat conference.
#FastTips
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
DOWNLOAD THE REAL LEAKED SOURCE CODE FROM MICROSOFT :
(TORRENT LINK)
magnet:?xt=urn:btih:3d8b16242b56a3aafb8da7b5fc83ef993ebcf35b&dn=Microsoft%20leaked%20source%20code%20archive_2020-09-24&tr=udp%3a%2f%2ftracker.coppersurfer.tk%3a6969%2fannounce&tr=udp%3a%2f%2f9.rarbg.me%3a2850%2fannounce&tr=udp%3a%2f%2f9.rarbg.to%3a2920%2fannounce&tr=udp%3a%2f%2ftracker.opentrackr.org%3a1337&tr=udp%3a%2f%2ftracker.leechers-paradise.org%3a6969%2fannounce
(TORRENT LINK)
magnet:?xt=urn:btih:3d8b16242b56a3aafb8da7b5fc83ef993ebcf35b&dn=Microsoft%20leaked%20source%20code%20archive_2020-09-24&tr=udp%3a%2f%2ftracker.coppersurfer.tk%3a6969%2fannounce&tr=udp%3a%2f%2f9.rarbg.me%3a2850%2fannounce&tr=udp%3a%2f%2f9.rarbg.to%3a2920%2fannounce&tr=udp%3a%2f%2ftracker.opentrackr.org%3a1337&tr=udp%3a%2f%2ftracker.leechers-paradise.org%3a6969%2fannounce
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦the recent vulnerabilities in the architecture of Intel, AMD and ARM processors:
1) How fortunate that critical vulnerabilities in the architecture of Intel, AMD and ARM processors were published while we were resting.
2) We did not have time to change the equipment, as recommended by US-CERT, as it turned out that it was enough to update the operating systems.
3) Well, the manufacturers had time to release updates.
So, what is the bottom line at the moment.
4) There are two vulnerabilities - Meltdown ("Crash") and Specter ("Ghost").
5) Meltdown allows you to break the barrier between applications and the internal memory of the operating system, which opens access to data stored in the memory of the OS.
Detailed description https://meltdownattack.com/meltdown.pdf.
6) Well, there are also exploits, for example: https://github.com/paboldin/meltdown-exploit.
7) Specter breaks memory isolation between applications themselves: conventionally, one service can crawl into the memory of another.
Description https://spectreattack.com/spectre.pdf. They say exploiting the vulnerability is more difficult, but there are still exploits: https://github.com/crozone/SpectrePoC, https://github.com/Eugnis/spectre-attack.
In general, a nightmare! Update, definitely!
8) Fears about 30% loss of productivity in practice are not justified
π¦Microsoft:
Windows Server 2008 R2 Service Pack 1, Windows 7 Service Pack 1 - KB4056897 or KB4056894
Windows Server 2012 Standard - KB4056899 or KB4056896
Windows 8.1, Windows Server 2012 R2 Standard - KB4056898 or KB4056895
Windows 10 Enterprise - KB4056893
Windows 10 Version 1607, Windows Server 2016 , Windows 10 Mobile - KB4056890
Windows 10 Version 1703 - KB4056891
Windows 10 version 1709 - KB4056892
There may be problems installing the patch due to the antivirus.
Provided a list of antiviruses that block the patch: BitDefender, Carbon Black, Cisco, CrowdStrike, Cylance, Cyren, Endgame, Fortinet, G-DATA, McAfee, Nyotron, Palo-Alto, SentinelOne, Sophos, Trend Micro, VIPRE, Webroot.
9) Modifying or creating the following registry key may help resolve the issue:
?
Key="HKEY_LOCAL_MACHINE"Subkey="SOFTWARE\Microsoft\Windows\CurrentVersion\QualityCompat"
Value Name="cadca5fe-87d3-4b96-b7fb-a231484277cc"
Type="REG_DWORD"
Data="0x00000000"
Very short on performance: tests with the Windows 10 update showed a decrease in various performance parameters by 1-2%.
Details: http://www.guru3d.com/articles-pages/windows-vulnerability-cpu-meltdown-patch-benchmarked.html.
π¦Linux:
Everything is simple, you need a kernel 4.14.12, 4.9.75 or 4.4.110. There are no updates for other branches, but they have a bunch of other unpatched vulnerabilities, so they are not recommended for use.
π¦Apple:
Meltdown has been fixed in iOS 11.2, macOS 10.13.2, and tvOS 11.2. No update is required for watchOS.
Specter, Apple claims, is only practically exploitable via JavaScript in a web browser, so they will keep Safari updated. This patch, as well as the Axis Specter patches, are pending.
π¦Google:
Android with the patch from 2018-01-05 is protected.
Chrome 64 adds Specter protection, but is set to release on January 23rd. For now, if you wish, you can enable Site Isolation to protect against attacks.
π¦Firefox:
Mozilla has provided a browser-based patch to prevent Specter from being used in version 57 of Firefox.
π¦Cisco:
Just doing analysis and getting ready to release patches.
Status here: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦the recent vulnerabilities in the architecture of Intel, AMD and ARM processors:
1) How fortunate that critical vulnerabilities in the architecture of Intel, AMD and ARM processors were published while we were resting.
2) We did not have time to change the equipment, as recommended by US-CERT, as it turned out that it was enough to update the operating systems.
3) Well, the manufacturers had time to release updates.
So, what is the bottom line at the moment.
4) There are two vulnerabilities - Meltdown ("Crash") and Specter ("Ghost").
5) Meltdown allows you to break the barrier between applications and the internal memory of the operating system, which opens access to data stored in the memory of the OS.
Detailed description https://meltdownattack.com/meltdown.pdf.
6) Well, there are also exploits, for example: https://github.com/paboldin/meltdown-exploit.
7) Specter breaks memory isolation between applications themselves: conventionally, one service can crawl into the memory of another.
Description https://spectreattack.com/spectre.pdf. They say exploiting the vulnerability is more difficult, but there are still exploits: https://github.com/crozone/SpectrePoC, https://github.com/Eugnis/spectre-attack.
In general, a nightmare! Update, definitely!
8) Fears about 30% loss of productivity in practice are not justified
π¦Microsoft:
Windows Server 2008 R2 Service Pack 1, Windows 7 Service Pack 1 - KB4056897 or KB4056894
Windows Server 2012 Standard - KB4056899 or KB4056896
Windows 8.1, Windows Server 2012 R2 Standard - KB4056898 or KB4056895
Windows 10 Enterprise - KB4056893
Windows 10 Version 1607, Windows Server 2016 , Windows 10 Mobile - KB4056890
Windows 10 Version 1703 - KB4056891
Windows 10 version 1709 - KB4056892
There may be problems installing the patch due to the antivirus.
Provided a list of antiviruses that block the patch: BitDefender, Carbon Black, Cisco, CrowdStrike, Cylance, Cyren, Endgame, Fortinet, G-DATA, McAfee, Nyotron, Palo-Alto, SentinelOne, Sophos, Trend Micro, VIPRE, Webroot.
9) Modifying or creating the following registry key may help resolve the issue:
?
Key="HKEY_LOCAL_MACHINE"Subkey="SOFTWARE\Microsoft\Windows\CurrentVersion\QualityCompat"
Value Name="cadca5fe-87d3-4b96-b7fb-a231484277cc"
Type="REG_DWORD"
Data="0x00000000"
Very short on performance: tests with the Windows 10 update showed a decrease in various performance parameters by 1-2%.
Details: http://www.guru3d.com/articles-pages/windows-vulnerability-cpu-meltdown-patch-benchmarked.html.
π¦Linux:
Everything is simple, you need a kernel 4.14.12, 4.9.75 or 4.4.110. There are no updates for other branches, but they have a bunch of other unpatched vulnerabilities, so they are not recommended for use.
π¦Apple:
Meltdown has been fixed in iOS 11.2, macOS 10.13.2, and tvOS 11.2. No update is required for watchOS.
Specter, Apple claims, is only practically exploitable via JavaScript in a web browser, so they will keep Safari updated. This patch, as well as the Axis Specter patches, are pending.
π¦Google:
Android with the patch from 2018-01-05 is protected.
Chrome 64 adds Specter protection, but is set to release on January 23rd. For now, if you wish, you can enable Site Isolation to protect against attacks.
π¦Firefox:
Mozilla has provided a browser-based patch to prevent Specter from being used in version 57 of Firefox.
π¦Cisco:
Just doing analysis and getting ready to release patches.
Status here: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β