p.file
207 subscribers
52 photos
7 videos
161 files
296 links
Please read the pinned post.

The group has restriction for links due to spam bots, but you can send it anyway.

@perplex_files
Download Telegram
p.file
Project_Zero_Exploiting_the_DRAM_rowhammer_bug_to_gain_kernel_privileges.pdf
Flipping_Bits_in_Memory_Without_Accessing_Them_An_experimental_Study.pdf
827.9 KB
The repeated toggling of a row's wordline can disturb nearby cells and make them lose charge, if a cell loses too much charge before it is restored, it experiences a disturbance error. The following code is used to disturb the cells:

code1a:
mov (X), %eax
mov (Y), %ebx
clflush (X) // See
Vol 3 11.5.5
clflush (Y)
mfence // Not used in the Google's article.
jmp code1a
p.file
Flipping_Bits_in_Memory_Without_Accessing_Them_An_experimental_Study.pdf
In this structure, when the access transistor is turned on by applying a voltage on the gate of the access transistor, a voltage representing the data value is placed onto the bitline and charges the storage capacitor. The storage capacitor then retains the stored charge after the access transistor is turned off and the voltage on the wordline is removed. However, the electrical charge stored in the storage capacitor will gradually leak away with the passage of time. To ensure data integrity, the stored data value in the DRAM cell must be periodically read out and written back by the DRAM device in a process known as refresh.

From Memory Systems: Cache, DRAM, Disk.
heic1502a.png
21.3 MB
A little piece of Andromeda's Galaxy
#misc Full Adromeda's Galaxy picture
Forwarded from A paranoid man makes paranoid plans
Designing_BSD_Rootkits_An_Introduction_to_Kernel_Hacking_by_Joseph.pdf
8.4 MB
Designing BSD rootkits

#bsd #hacking
Forwarded from Freestanding
Forth_Encyclopedia_The_Complete_Forth_Programmers_Manual_by_Mitch.pdf
4.3 MB
Forth Encyclopedia: The Complete Forth Programmers Manual

1982

#forth
Forwarded from A paranoid man makes paranoid plans
[gentoo-announce] [ GLSA 202105-07 ] Telegram: Security bypass

> https://groups.google.com/g/linux.gentoo.announce/c/hb2RWnEhV7c

risk: Low

#hacking
Forwarded from Freestanding
Reverse engineering my router's firmware with binwalk

> https://embeddedbits.org/reverse-engineering-router-firmware-with-binwalk/

#hacking