Drammer - The Making Of
Offered By: Hack In The Box Security Conference via YouTube
Course Description
Overview
Syllabus
Intro
A Little Background
Rawhammer
Bypass the CPU cache
Select the Aggressor Rows
Rowhammer Exploitation
Hammering a Needle in the Software Stack
A Quick Google Search
Arrival at Santa Barbara
Benchmarking DRAM Bandwidth
Kernel Module
A piece of art: meh.cc
Debug, Hammer, Debug
E-Mail From The Bos
Flipping Bits On The Beach
Downward Spiral
The cacheflush System Call
Pointer Chasing
Flipping Bits By Executing Code
Cache Maintenance Operations
Martina
Memory templating
Scientific Value
Land sensitive data
a. Exhaust Large Chunks
b. Find a Bit Flip
Release Vulnerable Chunk
Exhaust Rows (again)
a. Release Vulnerable Row
b. Release Large Chunks
Allocate Pages until we hit the vulnerable now
Padding
Map a Page Table
Evaluation
Wrapping Up
Disclosure
Drammer
Taught by
Hack In The Box Security Conference
Related Courses
Cyber Security in ManufacturingUniversity at Buffalo via Coursera Security Awareness Training
(ISC)² via Coursera Masterclass - Hacking de dispositivos moviles
Udemy Threat and Vulnerability Management for CompTIA CySA+
Pluralsight Protecting Devices and Applications in Microsoft 365
Pluralsight