aa23_187a_increased_truebot_activity_infects_us_and_canada_based.pdf
869.6 KB
📕Increased Truebot Activity Infects U.S. and Canada Based Networks
🔖Breaking the silence - Recent Truebot activity
🔖TrueBot Analysis Part I - A short glimpse into packed TrueBot samples
🔖TrueBot Analysis Part II - Static unpacker
🔖TrueBot Analysis Part III - Capabilities
🔖Investigating Intrusions From Intriguing Exploits
🔖Carbon Black’s TrueBot Detection
🔖A Truly Graceful Wipe Out
#CSA #CISA #FBI #MS_ISAC #CCCS #USA #Canada #CL0P #ransomware #botnet #Truebot #Raspberry_Robin #Flawed_Grace #Cobalt_Strike #Teleport #CVE_2022_31199 #expoitation #Phishing #IoCs #TTPs #Detection #DFIR
🔖Breaking the silence - Recent Truebot activity
🔖TrueBot Analysis Part I - A short glimpse into packed TrueBot samples
🔖TrueBot Analysis Part II - Static unpacker
🔖TrueBot Analysis Part III - Capabilities
🔖Investigating Intrusions From Intriguing Exploits
🔖Carbon Black’s TrueBot Detection
🔖A Truly Graceful Wipe Out
#CSA #CISA #FBI #MS_ISAC #CCCS #USA #Canada #CL0P #ransomware #botnet #Truebot #Raspberry_Robin #Flawed_Grace #Cobalt_Strike #Teleport #CVE_2022_31199 #expoitation #Phishing #IoCs #TTPs #Detection #DFIR
👍2
Tor-with-spoofing.zip
5.9 KB
⚙️ DarkHorse is a UDP-based framework, that improves the E2E latency and the data transfer overhead of Tor onion services by exploiting the connectionless nature of UDP.
#anonymity #privacy #Tor #E2E #relays #Latency #DarkHorse #IP_spoofing #MTD #asymmetric_paths #onion_services #UDP
#anonymity #privacy #Tor #E2E #relays #Latency #DarkHorse #IP_spoofing #MTD #asymmetric_paths #onion_services #UDP
👍6
Centauri.pdf
1.2 MB
📕Centauri: Practical Rowhammer Fingerprinting
"Centauri is a Rowhammer fingerprinting approach that can build a unique and stable fingerprints even across devices with homogeneous or normalized/obfuscated hardware and software configurations. To this end, Centauri leverages the process variation in the underlying manufacturing process that gives rise to unique distributions of Rowhammer-induced bit flips across different DRAM modules. Centauri's design and implementation is able to overcome memory allocation constrains without requiring root privileges."
🤔"Our evaluation on a test bed of about one hundred DRAM modules shows that system achieves 99.91% fingerprinting accuracy."
⚙️ Program for testing for the DRAM "rowhammer" problem.
🔖 Exploiting the DRAM rowhammer bug to gain kernel privileges
📕Rowhammer.js: A Remote Software-Induced Fault Attack in JavaScript
#deanonymization #Fingerprinting #hw #sw #expoitation #DRAM #memory_cells #Rowhammer #Centauri
"Centauri is a Rowhammer fingerprinting approach that can build a unique and stable fingerprints even across devices with homogeneous or normalized/obfuscated hardware and software configurations. To this end, Centauri leverages the process variation in the underlying manufacturing process that gives rise to unique distributions of Rowhammer-induced bit flips across different DRAM modules. Centauri's design and implementation is able to overcome memory allocation constrains without requiring root privileges."
🤔"Our evaluation on a test bed of about one hundred DRAM modules shows that system achieves 99.91% fingerprinting accuracy."
⚙️ Program for testing for the DRAM "rowhammer" problem.
🔖 Exploiting the DRAM rowhammer bug to gain kernel privileges
📕Rowhammer.js: A Remote Software-Induced Fault Attack in JavaScript
#deanonymization #Fingerprinting #hw #sw #expoitation #DRAM #memory_cells #Rowhammer #Centauri
👍2