Andrey Konovalov sitere na Google
Mkpọchi na-egbochi onye ọrụ ohere ịnweta kernel ma gbochie UEFI Secure Boot bypass ụzọ. Dịka ọmụmaatụ, na ọnọdụ mkpọchi, ịnweta / dev/mem, / dev/kmem, / dev/port, /proc/kcore, debugfs, kprobes debug mode, mmiotrace, tracefs, BPF, PCMCIA CIS (Kaadị Ozi Structure), ụfọdụ interfaces nwere oke ACPI na ndekọ MSR nke CPU, akpọchie oku kexec_file na kexec_load, amachibidoro ọnọdụ ụra, amachibidoro iji DMA maka ngwaọrụ PCI, amachibidoro mbubata koodu ACPI site na mgbanwe EFI, adịghị eji ọdụ ụgbọ mmiri I/O eme ihe. ekwe, gụnyere ịgbanwe nọmba nkwụsịtụ yana ọdụ ụgbọ mmiri I/O maka ọdụ ụgbọ mmiri.
Agbakwunyere usoro mkpọchi n'oge na-adịbeghị anya na kernel Linux bụ isi
Na Ubuntu na Fedora, a na-enye nchikota igodo Alt + SysRq + X iji gbanyụọ mkpọchi. Aghọtara na enwere ike iji Nchikota Alt + SysRq + X naanị iji nweta ngwaọrụ ahụ, na n'ihe gbasara hacking ime ime na ịnweta ohere mgbọrọgwụ, onye mwakpo ahụ agaghị enwe ike gbanyụọ Lockdown na, dịka ọmụmaatụ, buru ibu a. modul nwere rootkit na-abanyeghị na dijitalụ n'ime kernel.
Andrey Konovalov gosipụtara na ụzọ dabere na kiiboodu maka ịkwado ọnụnọ anụ ahụ onye ọrụ adịghị arụ ọrụ. Ụzọ kacha mfe iji gbanyụọ Lockdown ga-abụ na mmemme
Usoro nke mbụ gụnyere iji interface "sysrq-trigger" - iji mee ka ọ dị, mee ka interface a nwee ike ide "1" ka /proc/sys/kernel/sysrq, wee dee "x" na /proc/sysrq-trigger. kwuru loophole
Usoro nke abụọ gụnyere iṅomi ahụigodo site na
isi: opennet.ru