aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorJesús <heckyel@hyperbola.info>2019-05-18 14:13:51 -0500
committerJesús <heckyel@hyperbola.info>2019-05-18 14:13:51 -0500
commit412e11379e7d439d88bc8dc65f743783e21232d4 (patch)
tree7934a4eaf04284cd2d2f9b5578475f5a70ac38d5
parent5f7c730c82376f47010640c389c9e61106954d62 (diff)
downloadcl-412e11379e7d439d88bc8dc65f743783e21232d4.tar.lz
cl-412e11379e7d439d88bc8dc65f743783e21232d4.tar.xz
cl-412e11379e7d439d88bc8dc65f743783e21232d4.zip
Added video author of "URL recorery" into Vulnerabilidad MDS en procesadores Intel
-rw-r--r--content/ataque-mds.md9
1 files changed, 9 insertions, 0 deletions
diff --git a/content/ataque-mds.md b/content/ataque-mds.md
index 51698c3..f602cf3 100644
--- a/content/ataque-mds.md
+++ b/content/ataque-mds.md
@@ -32,6 +32,10 @@ de ejecución especulativa de la CPU.
pero los ataques MDS podrían leer los datos en los diferentes búferes
de la CPU (Hilos).
+## Ejemplo de ataque:
+
+### URL Recovery
+
<video class="player-ply" playsinline controls>
<source src="https://archive.org/download/libreweb/zombieLoad-in-action-spying-on-your-visited-websites.webm" type="video/webm">
<p>Lo siento, tu navegador no soporta HTML 5. Por
@@ -69,9 +73,14 @@ de Intel al mismo tiempo se publicó una [noticia][new] en su web oficial.
[Intel Analysis ](https://software.intel.com/security-software-guidance/insights/deep-dive-intel-analysis-microarchitectural-data-sampling)
+#### Autor del vídeo "URL Recovery":
+
+[Cyberus Technology GmbH][cyberus]
+
<!--Plyr-->
<script src="{static}/vendor/js/play.js"></script>
<!--EndPlyr-->
+[cyberus]: https://www.cyberus-technology.de/posts/2019-05-14-zombieload.html
[MDS]: https://git.hyperbola.info:50100/packages/core.git/commit/?id=25b9c740344ffc4bbdbe128794fc24c3b990ae59
[new]: https://www.hyperbola.info/news/hyperbola-users-are-now-mitigated-against-microarchitectural-data-sampling-mds-vulnerabilities/