enSilo to Discover Turning Tables Windows Exploit

Researchers claim that using this exploit any Windows version can be hacked
21 August 2018   804

Specialists from enSilo Omri Misgav and Udi Yavo said they developed a new Windows hacking technique called Turning Tables. The exploit uses the page table of the system and allows to bypass all kernel protection mechanisms.

The system page table contains data that matches the contents of the virtual and physical memory. Some programs can use the same parts of the code, and in order to optimize the load, different programms can use the same page. The essence of the Turning Tables technique is to change the code on these pages in such a way as to change the behavior of processes with high priority.

Turning Tables
Turning Tables

Using the discovered exploit, an attacker can increase the priority of his own process. Moreover, the vulnerability can be used to attack the processes running in the sandbox.

Since the principle of shared pages, in addition to Windows, is also used in macOS and Linux, in theory, these operating systems may be vulnerable.

Cloudflare to Develop IPFS Gateway

According to the developers, new gateway will allow to create P2P based websites
20 September 2018   217

Cloudflare told about the IPFS gateway, which will allow creating sites based on P2P network. The company said that access to content will be done without having to install special software on the devices.

As a technology feature, Cloudflare experts note decentralization. Using a standard network scheme with servers involves physical storage of data in one place. Hacking the server or damage to communications as a result of an emergency (for example, a natural disaster) will lead to inaccessibility of information or its loss. The same is threatened with information if the server owner has decided to refuse it.

Cloudflare Network
Cloudflare Network

The IPFS gateway combines computers, on each of which some information is stored, to the worldwide network. Therefore, the inaccessibility of one computer does not mean that the content can not be viewed or downloaded. Therefore, the key differences are two:

  1. With IPFS, anyone can freely post information instead of storing it on remote servers and paying for their services.
  2. Requests for access to data are carried out using cryptographic hashing, rather than by IP address. The query data is converted to a series of letters and numbers, by which the system finds the required files. For example, the query for any information will not like "get information that is located at IP address 93.184.216.34", but the kind "get information with hash sum QmXnnyufdzAWL5CqZ2RnSNgPbvCc1ALT73s6epPrRnZ1Xy". This hash sum is part of the desired file and is on several computers.

The system automatically determines the authenticity of the file. If we take as an example a query with a hash sum QmXnnyufdzAWL5CqZ2RnSNgPbvCc1ALT73s6epPrRnZ1Xy, then when receiving the information it should remain the same. If the hash value differs, then the file has been changed. In other words, the hash-sum can be represented as a unique fingerprint:

IPFS Security
IPFS Security

Supporters of decentralization are also in a number of other companies. Mozilla employees believe that consumers should not be tied to a particular product, brand or platform. In early August 2018, developers published a version of the IoT gateway Things Gateway 0.5. In it, they realized the possibility of loading third-party icons and an interface for complex devices.