Привет друзья. Интересует вопрос как можно на Virtual Box подменить все данные.
А конкретно интересует процессор и видеокарта.
А конкретно интересует процессор и видеокарта.
- Security Impact: There are many of hardware, kernel, debug information, etc. in /sys and /proc, which is especially problematic and has been the cause of many infoleaks such as kernel pointer leaks.
- Security / Privacy Impact: Details about your hardware can aid attacks and can be used for identification.
- Threat: This information is per Debian (and probably most popular Linux distributions) available to attackers with local code execution privileges which includes,
- malicious applications collecting such information and submitting it to data collectors,
- as well as both, compromised non-privileged users and the privileged root user.
- Non-Threat: This information does not randomly leak to third parties on clean (non-compromised) machines through use of legitimate applications such as the APT package manager. Legitimate applications do not request the information from the kernel, let alone leak them to third-parties over the internet.
- Goal: This information should by default be unavailable to non-privileged users and untrusted root.
- Solution: Therefore security-misc includes the hide-hardware-info.service systemd unit.
- Restricts access to /sys, /proc/cpuinfo, /proc/bus, and /proc/scsi to the root user only.
- This also hides most hardware identifiers.
- Status: This setting is disabled by default because it might break many applications. Testers-only! Call for testers and forum discussion:
- Enable: It can optionally be enabled by running the following command.
- sudo systemctl enable hide-hardware-info.service
- Reboot required.
- A whitelist that allows specific applications to access /sys and /proc/cpuinfo is enabled by default to maintain basic functionality. [1] For example, this allows the launching of applications like Xfce.
- Limitations of Solution:
- root compromise: Attackers which gained root compromise and/or malicious/compromised whitelisted applications have access to this information.
- CPUID: Cannot hide CPUID.
Это только половина работы, нужно глубже смотреть и шире)Sorry for the english language, translate if its in your interest:
Check here:
Github configuration and codes>
![]()
GitHub - Kicksecure/security-misc: Kernel Hardening; Protect Linux User Accounts against Brute Force Attacks; Improve Entropy Collection; Strong Linux User Account Separation; Enhances Misc Security Settings - https://www.kicksecure.com/wiki/Security
Kernel Hardening; Protect Linux User Accounts against Brute Force Attacks; Improve Entropy Collection; Strong Linux User Account Separation; Enhances Misc Security Settings - https://www.kicksecure...github.com
Hiding System Information>
Это только половина работы, нужно глубже смотреть и шире)
Очень странно что такие супер секьюрные дистрибьютивы не занимаются этим, что наталкивает на определенные мысли =)
![]()
seabios/src/fw at master · qemu/seabios
Mirror of git.qemu.org/seabios.git. Contribute to qemu/seabios development by creating an account on GitHub.github.com
Равно как и дистрибьютив qubes не подменяет идентификаторы.
Обмажтесь ононимностью и безопасными дистрибьютивами и не думайте над тем как скрыть сам факт использования такого дистрибьютива)))