Can a meltdown attack also violate data integrity of other processes or is it just violating data secrecy?

Can a meltdown attack also violate data integrity of other processes by obtaining different passwords or is it just violating data secrecy by reading data it is unauthorized to do?

Continue reading Can a meltdown attack also violate data integrity of other processes or is it just violating data secrecy?

Retrocomputing With Modern Hardware, No Emulation Required

The x86 processor family is for the time being, the most ubiquitous type of processor in the PC world, and has been since the 1980s when the IBM PC came on the scene. Emulating these older devices is easy enough if you want to play an old LucasArts game or …read more

Continue reading Retrocomputing With Modern Hardware, No Emulation Required

msfvenom: how to output assembly of windows payload for inline assembly in C?

My goal is to obfuscate metasploit windows payloads’ assembly code (adding junk code to the payload itself), then adding the obfuscated shellcode to inline assembly in C. The issue is there is no format command line argument (-f) that prov… Continue reading msfvenom: how to output assembly of windows payload for inline assembly in C?