Home Hacking In-Spectre-Meltdown – Tool to identify Meltdown & Spectre Vulnerabilities in processors

In-Spectre-Meltdown – Tool to identify Meltdown & Spectre Vulnerabilities in processors

54
0
SHARE

 

This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CVE-2017-5754 (Meltdown) and CVE-2017-5715 (Spectre) allows unprivileged processes to steal secrets from privileged processes. These attacks present 3 different ways of attacking data protection measures on CPUs enabling attackers to read data they shouldn’t be able to.
This tool is originally based on Microsoft: https://support.microsoft.com/en-us/help/4073119/protect-against-speculative-execution-side-channel-vulnerabilities-in
Please note:
This solution has been tested successfully using Python 3.6.3 & PowerShell version 5.1.

How do I use this?

  • Run the python code or download the executable from the releases section and run it as an administrator user.
  • Press Number 1, 2, 3 & 4 in sequence to see the results.
  • Press 1: Sets the execution policy to unrestricted.
  • Press 2: Imports necessary PowerShell modules
  • Press 3: Installs Spectre related modules within PowerShell
  • Press 4: Inspects control settings for Spectre & Meltdown and displays result
  • Press 5: Exit from the program

Do I need to run the executable as administrator?

  • Yes, Right click on the “In-Spectre_meltdown.exe” and run as administrator to get the results.

Questions?
Twitter: https://twitter.com/maniarviral
LinkedIn: https://au.linkedin.com/in/viralmaniar

Download In-Spectre-Meltdown
Read more…

 

LEAVE A REPLY

Please enter your comment!
Please enter your name here