Andrey Konovalov mai Google
Hoʻopaʻa ʻo Lockdown i ke komo ʻana o ka mea hoʻohana aʻa i ka kernel a hoʻopaʻa ʻia i nā ala ala ʻo UEFI Secure Boot. No ka laʻana, ma ke ʻano laka, komo i /dev/mem, /dev/kmem, /dev/port, /proc/kcore, debugfs, kprobes debugging mode, mmiotrace, tracefs, BPF, PCMCIA CIS (Card Information Structure), kekahi ʻAʻole i kaupalena ʻia nā kikowaena ACPI a me MSR o ka CPU, kāhea ʻia ke kexec_file a me kexec_load, pāpā ʻia ke ʻano moe, kaupalena ʻia ka hoʻohana ʻana o DMA no nā polokalamu PCI, pāpā ʻia ka lawe ʻana mai o ka code ACPI mai nā ʻano EFI, ʻaʻole ʻae ʻia nā manipulations me nā awa I/O. ʻae ʻia, me ka hoʻololi ʻana i ka helu interrupt a me ke awa I/O no ke awa serial.
Ua hoʻohui hou ʻia ka mīkini Lockdown i ka kernel Linux nui
Ma Ubuntu a me Fedora, ua hāʻawi ʻia ka hui kī Alt + SysRq + X e hoʻopau i ka Lockdown. Hoʻomaopopo ʻia hiki ke hoʻohana wale ʻia ka hui ʻana o Alt + SysRq + X me ke komo kino i ka hāmeʻa, a i ka hihia o ka hacking mamao a loaʻa i ke aʻa, ʻaʻole hiki i ka mea hoʻouka ke hoʻopau iā Lockdown a, no ka laʻana, hoʻouka i kahi. module me kahi rootkit ʻaʻole i hoʻopaʻa inoa ʻia i loko o ka kernel.
Ua hōʻike ʻo Andrey Konovalov ʻaʻole pono nā ʻano papa keyboard no ka hōʻoia ʻana i ke kino kino o ka mea hoʻohana. ʻO ke ala maʻalahi loa e hoʻopau iā Lockdown ʻo ia ka programmatically
ʻO ke ala mua e pili ana i ka hoʻohana ʻana i ka "sysrq-trigger" interface - e hoʻohālikelike iā ia, e ʻae wale i kēia interface ma ke kākau ʻana i "1" i /proc/sys/kernel/sysrq, a laila kākau i "x" i /proc/sysrq-trigger. Ua ʻōlelo ʻia he lua
ʻO ke ala ʻelua e pili ana i ka emulation keyboard ma
Source: opennet.ru