meltdown-poc

by GitMirar

GitMirar /meltdown-poc

A PoC implementation of the meltdown attack described in https://meltdownattack.com/meltdown.pdf

132 Stars 27 Forks Last release: Not found BSD 3-Clause "New" or "Revised" License 5 Commits 0 Releases

Available items

No Items, yet!

The developer of this repository has not created any items for sale yet. Need a bug fixed? Help with integration? A different license? Create a request here:

meltdown-poc

A PoC implementation of the meltdown attack described in https://meltdownattack.com/meltdown.pdf

This implementation was tested on Windows 10 (

10.0.15063.0
) on Intel Atom x5-Z8350 hardware.

It is likely that it needs some tweaking to run properly on other platforms.

So far only some specific kernel memory could be leaked, it worked with the page containing PsLoadedModuleList very well, with the kernel base address not so well.

UPDATE:

As pointed out in http://blog.fefe.de/?ts=a4ad9f54 the google blogpost documents a precondition which must be fullfilled for memory in order to be readable by meltdown.

This seems to be that the data must be present in the L1 cache of the executing core.

Reference: https://googleprojectzero.blogspot.de/2018/01/reading-privileged-memory-with-side.html

screenshot

We use cookies. If you continue to browse the site, you agree to the use of cookies. For more information on our use of cookies please see our Privacy Policy.