YoVDO

Flip Feng Shui - Rowhammering the VM's Isolation

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Virtualization Courses OpenSSH Courses RSA Encryption Courses

Course Description

Overview

Explore a Black Hat conference talk that delves into the Flip Feng Shui attack, demonstrating how an attacker's virtual machine can exploit Rowhammer vulnerabilities to compromise the isolation of other VMs on the same host. Learn about memory duplication, copy-on-write mechanisms, and physical memory manipulation techniques used in this attack. Understand the basics of RSA cryptography and how it relates to the exploit. Examine specific attack scenarios targeting OpenSSH, page tables, inodes, and input passwords. Watch a video demonstration of the attack and discuss its implications for VM security. Gain insights into the apt package manager's keyring system and how bit flips can be leveraged in this context. Conclude with a Q&A session addressing the reception and broader impact of this research on virtualization security.

Syllabus

Introduction
Who are we
Outline
Flippin
How does it work
Memory duplication
Copyonwrite
Physical Memory
Flipping
RSA Basics
Recap
What to Attack
OpenSSH Attack
Attack 1 Page Tables
Attack 2 I Nodes
Attack 3 Input Password
Attack 3 Original Authors
Attack 3 Binary Representation
How apt works
apt keyring
bit flips
video demo
Reception
Conclusions
Question


Taught by

Black Hat

Related Courses

LINUX SYSTEM ADMINISTRATION
Foothill College via California Community Colleges System
Learning SSH
LinkedIn Learning
regreSSHion - an OpenSSH RCE Vulnerability: What You Should Know
Pluralsight
Play by Play: Open Source Projects from the PowerShell Team
Pluralsight
Linux Network and Host Security
Pluralsight