diff options
author | Jesús <heckyel@hyperbola.info> | 2019-05-19 15:19:25 -0500 |
---|---|---|
committer | Jesús <heckyel@hyperbola.info> | 2019-05-19 15:19:25 -0500 |
commit | d2340f3032adc76feed7d3701319e8fe269c352c (patch) | |
tree | 86581a71186c6bcfa2a05968bb9c00ba62d232bc | |
parent | 309af18a6c69b9416b6543e2dff7386d3ab0358b (diff) | |
download | cl-d2340f3032adc76feed7d3701319e8fe269c352c.tar.lz cl-d2340f3032adc76feed7d3701319e8fe269c352c.tar.xz cl-d2340f3032adc76feed7d3701319e8fe269c352c.zip |
Added figcaption into 'Vulnerabilidad MDS en procesadores Intel'
-rw-r--r-- | content/ataque-mds.md | 13 |
1 files changed, 5 insertions, 8 deletions
diff --git a/content/ataque-mds.md b/content/ataque-mds.md index ec5d0ef..f52bfba 100644 --- a/content/ataque-mds.md +++ b/content/ataque-mds.md @@ -36,11 +36,16 @@ de la CPU (Hilos). ### URL Recovery +<figure markdown="span"> <video class="player-ply" playsinline controls> <source src="https://archive.org/download/libreweb/zombieLoad-in-action-spying-on-your-visited-websites.webm" type="video/webm"> <p>Lo siento, tu navegador no soporta HTML 5. Por favor, cambia o actualiza tu navegador</p> </video> +<figcaption> +<p>Autor del vídeo: [Cyberus Technology GmbH][cyberus]. Programa usado para el test [Proof-of-concept for the ZombieLoad attack](https://github.com/IAIK/ZombieLoad)</p> +</figcaption> +</figure> Los investigadores dicen que esta falla se puede utilizar para desviar datos de la CPU a una velocidad casi en tiempo real, y se puede utilizar para extraer @@ -73,14 +78,6 @@ de Intel al mismo tiempo se publicó una [noticia][new] en su web oficial. [Intel Analysis ](https://software.intel.com/security-software-guidance/insights/deep-dive-intel-analysis-microarchitectural-data-sampling) -#### Autor del vídeo "URL Recovery": - -[Cyberus Technology GmbH][cyberus] - -#### Programa usado para el test - -[Proof-of-concept for the ZombieLoad attack](https://github.com/IAIK/ZombieLoad) - <!--Plyr--> <script src="{static}/vendor/js/play.js"></script> <!--EndPlyr--> |