![memory hacker download sector memory hacker download sector](https://i.ytimg.com/vi/Uyu0TWi69A4/maxresdefault.jpg)
Or an attempt by a government/agency to crowdsource the deconstruction, or test the resilience of, these mechanisms. It could be an intentional leak/whistleblowing attempt to alert the security community to the existence of novel mechanisms. So, while I'm being credulous/fantastical, some final speculation as to why it would end up on the desk of a security researcher. To use an attack in this scenario the information targeted would have to be valuable enough to reveal the existence, and eventually the design, of a very expensive weapon. In this situation jumping air gaps and persistence increases the likelihood of successfully phoning home with a payload, but you would have to assume it's carrying that payload with it as its jumping from machine to machine. Industrial processes, plans, infrastructure, things that even if the target knows they are revealed that there's little they can do to invalidate or devalue the information. Pretend it is real and think about what type of information it could be targeting. Depending on the type of information gathered this could mean it's unreliable/useless for the attacker. "badBIOS" makes it clear to the target that any information that is even slightly likely to be accessible by the compromised system is compromised. Unless the entire purpose is economic sabotage, to create paranoia and force the replacement of a large number of expensive systems and the associated costs in labor and time. Persistence mechanisms are worthless if no one in their right mind would ever use the system for sensitive information again. The actions it takes (disabling optical drives, crippling regedit) would raise suspicion in any moderately sophisticated end user, never mind a security researcher. So far no one I've seen has asked why such an attack would be so technically brilliant and yet so tactically stupid as to reveal its presence so easily. Thanks for flying air /r/netsec || CISO AMA w/ Michael Coates & Rich Mason.r/vrd - Vulnerability Research and Development
#MEMORY HACKER DOWNLOAD SECTOR SOFTWARE#
r/rootkit - Software and hardware rootkits r/REMath - Math behind reverse engineering r/netsecstudents - netsec for noobs students r/Malware - Malware reports and information r/crypto - Cryptography news and discussion We're also on: Twitter, Facebook, & Google + Related Reddits » Our fulltext list of prohibited topics & sources Social No populist news articles (CNN, BBC, FOX, etc.) » Our fulltext discussion guidelines Prohibited Topics & Sources » Our fulltext content guidelines Discussion Guidelinesĭon't complain about content being a PDF.įollow all reddit rules and obey reddiquette. Hiring posts must go in the Hiring Threads. Non-technical posts are subject to moderation. r/netsec only accepts quality technical posts. "Give me root, it's a trust exercise." Featured Posts A community for technical news and discussion of information security and closely related topics.