• XSS.stack #1 – первый литературный журнал от юзеров форума

Sell PoC that allocates place in GPU and execute code

В этой теме можно использовать автоматический гарант!

Vubar

floppy-диск
Забанен
Регистрация
06.08.2021
Сообщения
8
Реакции
6
Пожалуйста, обратите внимание, что пользователь заблокирован
Sell PoC of technique that avoid AV detects from RAM scanning.
It allocates address space in GPU memory buffer, inserts and executes code from there.

Works only in Windows workstations that supports OpenCL 2.0 and higher!

Tested on: UHD 620, UHD 630, Radeon RX 5700, GeForce GTX 740M, GeForce GTX 1650.

Any proofs and checks. Can work with guarantor.
Telegram contact is under my profile pic.
Serious people only.
 
Последнее редактирование:
Пожалуйста, обратите внимание, что пользователь заблокирован
Funny. Did you carefully read the description of what I was selling?
Sure man. Your code is a natural continuation of such projects. This one by the way, is already 6 years old
 
Пожалуйста, обратите внимание, что пользователь заблокирован
Sure man. Your code is a natural continuation of such projects. This one by the way, is already 6 years old
Unfortunately, but you are wrong. The projects you bear in mind use code mapping back, unlike my technique.
 
Пожалуйста, обратите внимание, что пользователь заблокирован
Unfortunately, but you are wrong. The projects you bear in mind use code mapping back, unlike my technique.
Seems like Russian is not your native lang - I mean different. There are many such projects including real CPU emulators running inside GPU with OS and all possible code inside it -
 
Пожалуйста, обратите внимание, что пользователь заблокирован
More interesting GPU usage is not hiding the code from AV but using DMA (initiated from GPU side) for r/w access to the system memory thus totally avoiding CPU and all that is running at it.
 
Пожалуйста, обратите внимание, что пользователь заблокирован
More interesting GPU usage is not hiding the code from AV but using DMA (initiated from GPU side) for r/w access to the system memory thus totally avoiding CPU and all that is running at it.
Yes, but there is some DMA protection against such memory accesses like IOMMU. But have not deal with such attacks in practice.
 
Пожалуйста, обратите внимание, что пользователь заблокирован
Vubar, you're famous now.

 
Пожалуйста, обратите внимание, что пользователь заблокирован
Vubar, you're famous now.

I think about his fame he has known for a long time :)

 
Пожалуйста, обратите внимание, что пользователь заблокирован
One more word about DMA. In general, peripheral-based attacks are well known. For those who interested, here is a very cool paper with a long bibliographic list (around 150 sources) about this topic (2014 year).

1630588001100.png
 
Пожалуйста, обратите внимание, что пользователь заблокирован
Последнее редактирование:


Напишите ответ...
Верх