seDebugPrivilege and OpenProcess() – Trying to understand how Windows restricts access to a process’ virtual memory

I’ve been trying to understand how operating systems protect processes from each other. My understanding of Windows security is that a process can call OpenProcess() (thereby allowing read and write access to the virtual memo… Continue reading seDebugPrivilege and OpenProcess() – Trying to understand how Windows restricts access to a process’ virtual memory

Can a rootkit write to a virtual memory of a kernel process and rewrite a instruction to jump into his own malicious code inside that process?

So lets say we have a rootkit on our system

can this rootkit write something inside a kernel process?

for example in windows, can a rootkit write to ntoskrnl process, changing some functions and creating a new one, therefor… Continue reading Can a rootkit write to a virtual memory of a kernel process and rewrite a instruction to jump into his own malicious code inside that process?

Spectre and Meltdown: How Cache Works

The year so far has been filled with news of Spectre and Meltdown. These exploits take advantage of features like speculative execution, and memory access timing. What they have in common is the fact that all modern processors use cache to access memory faster. We’ve all heard of cache, but what exactly is it, and how does it allow our computers to run faster?

In the simplest terms, cache is a fast memory. Computers have two storage systems: primary storage (RAM) and secondary storage (Hard Disk, SSD). From the processor’s point of view, loading data or instructions from RAM is …read more

Continue reading Spectre and Meltdown: How Cache Works