▲ | anematode 5 days ago | |||||||
KASLR is broken anyway, at least on x86, even with KPTI (a Linux feature to mitigate Meltdown) enabled. See https://www.willsroot.io/2022/12/entrybleed.html, which still runs fine (with some modifications depending on the microarchitecture) on the latest AMD and Intel hardware that we've checked. | ||||||||
▲ | bri3d 5 days ago | parent | next [-] | |||||||
In addition to the original EntryBleed article, https://exploits.forsale/24h2-nt-exploit/ and the corresponding https://github.com/exploits-forsale/prefetch-tool are useful for understanding the same exploit on Windows (which works the exact same way, of course). | ||||||||
| ||||||||
▲ | bjackman 4 days ago | parent | prev | next [-] | |||||||
Yeah, there are so many ways to defeat KASLR. We need to treat the randomisation as a road bump, not a mitigation. Serious red team reports will just have a brief section like "then, we defeat KASLR with [technique]. Next..." | ||||||||
▲ | jcalvinowens 4 days ago | parent | prev [-] | |||||||
It still has some benefit: there's randomization within the kernel, knowing the base isn't always enough. |