• XSS.stack #1 – первый литературный журнал от юзеров форума

Как найти руткит на пк Win 11

25.jpg




Attack surface has moved below the OS. On fully patched win11 your realistic entry points are secure boot chain, DMA/PCIe or a 2nd hypervisor layer: not plain driver signing dodges. Minimalist OSes (openBSD, nix/guix with rollback) show the cheapest rootkit mitigation: ship nothing, expose nothing. Worth studying so you know which lavish windows/macos features you can safely rip out in hardened builds.
 
Посмотреть вложение 106301



Attack surface has moved below the OS. On fully patched win11 your realistic entry points are secure boot chain, DMA/PCIe or a 2nd hypervisor layer: not plain driver signing dodges. Minimalist OSes (openBSD, nix/guix with rollback) show the cheapest rootkit mitigation: ship nothing, expose nothing. Worth studying so you know which lavish windows/macos features you can safely rip out in hardened builds.
yo bro can you help please?
 
Всем Привет подскажите как найти руткит новичку:)
Подскажу старую хорошую утилиту ,сейчас не знаю поддерживается она или нет,утилита gmer.
 
Посмотреть вложение 106301



Attack surface has moved below the OS. On fully patched win11 your realistic entry points are secure boot chain, DMA/PCIe or a 2nd hypervisor layer: not plain driver signing dodges. Minimalist OSes (openBSD, nix/guix with rollback) show the cheapest rootkit mitigation: ship nothing, expose nothing. Worth studying so you know which lavish windows/macos features you can safely rip out in hardened builds.
Is it possible to reuse ideas from EFIGuard?
 
Is it possible to reuse ideas from EFIGuard?
Why not? You'll need to bypass Secure Boot anyway. Let me remind you that this project is very well detected. One way or another, you're going to have to make your own solution.
 


Напишите ответ...
  • Вставить:
Прикрепить файлы
Верх