diff options
author | Jesús <heckyel@hyperbola.info> | 2019-05-18 14:13:51 -0500 |
---|---|---|
committer | Jesús <heckyel@hyperbola.info> | 2019-05-18 14:13:51 -0500 |
commit | 412e11379e7d439d88bc8dc65f743783e21232d4 (patch) | |
tree | 7934a4eaf04284cd2d2f9b5578475f5a70ac38d5 | |
parent | 5f7c730c82376f47010640c389c9e61106954d62 (diff) | |
download | cl-412e11379e7d439d88bc8dc65f743783e21232d4.tar.lz cl-412e11379e7d439d88bc8dc65f743783e21232d4.tar.xz cl-412e11379e7d439d88bc8dc65f743783e21232d4.zip |
Added video author of "URL recorery" into Vulnerabilidad MDS en procesadores Intel
-rw-r--r-- | content/ataque-mds.md | 9 |
1 files changed, 9 insertions, 0 deletions
diff --git a/content/ataque-mds.md b/content/ataque-mds.md index 51698c3..f602cf3 100644 --- a/content/ataque-mds.md +++ b/content/ataque-mds.md @@ -32,6 +32,10 @@ de ejecución especulativa de la CPU. pero los ataques MDS podrían leer los datos en los diferentes búferes de la CPU (Hilos). +## Ejemplo de ataque: + +### URL Recovery + <video class="player-ply" playsinline controls> <source src="https://archive.org/download/libreweb/zombieLoad-in-action-spying-on-your-visited-websites.webm" type="video/webm"> <p>Lo siento, tu navegador no soporta HTML 5. Por @@ -69,9 +73,14 @@ de Intel al mismo tiempo se publicó una [noticia][new] en su web oficial. [Intel Analysis ](https://software.intel.com/security-software-guidance/insights/deep-dive-intel-analysis-microarchitectural-data-sampling) +#### Autor del vídeo "URL Recovery": + +[Cyberus Technology GmbH][cyberus] + <!--Plyr--> <script src="{static}/vendor/js/play.js"></script> <!--EndPlyr--> +[cyberus]: https://www.cyberus-technology.de/posts/2019-05-14-zombieload.html [MDS]: https://git.hyperbola.info:50100/packages/core.git/commit/?id=25b9c740344ffc4bbdbe128794fc24c3b990ae59 [new]: https://www.hyperbola.info/news/hyperbola-users-are-now-mitigated-against-microarchitectural-data-sampling-mds-vulnerabilities/ |