Bypassing kASLR via Cache Timing
Explores a prefetch side-channel attack to bypass kASLR on Windows 11 by measuring cache access times to locate the kernel base address.
https://r0keb.github.io/posts/Bypassing-kASLR-via-Cache-Timing/
#Exploiting the #NT #Kernel in 24H2: New Bugs in Old Code & Side Channels Against #KASLR
@mdhughes @Reiddragon this is oversimplifying by A LOT. For instance: some desktop things work better on #OpenBSD than #FreeBSD. #NetBSD was the first #BSD to implement #KASLR - before OpenBSD. It's not black and white and hasn't been for years now yet everybody copies the same fake mantras about these 3 BSDs.
#Linux Will Stop Randomizing Per-CPU Entry Area When #KASLR Is Not Active
https://www.phoronix.com/news/Linux-Random-Per-CPU-Entry-ASLR
Original tweet : https://twitter.com/phoronix/status/1640020726924161024
A new ETW event, […] that could point at various suspicious behaviors of #KASLR bypasses