![]() And lockdown does not have the required permissions to jump to rung 0 to make writes to your firmware. But importantly, this is not how security ring based isolation works. Your USB can be partitioned to use its own UEFI boot partition so that the e tries are completely seperate. Encrypt your boot partition and this would no longer be an issue. But let's say that lockdown did have the kernel level implementation needed to infect your firmware. This is not really true, and touches on the point of paranoid. Their website and YouTube has a lot of videos and explanations of how the software works from both the students and the teachers ends The company that owns responds has put a lot of information online about their software. Besides modifying the app code or somehow spoofing the disk through a live boot, something that might have potential is to install a type 1 desktop hypervisor I like qubes and test the application in one of those vms. However, I have yet to find out if you can open it on a system running vms on a type 1 hypervisor as, don't quote me on this, the management systems are different. From what I can see as far as getting it to run in a VM on a type 2 hypervisor is more difficult than one would think. Also if run in a VM it can detect if the app is being written to an virtual disk so it will refuse to run in those as well. I did some research on this and apparently the respondus app scans your system for virtual drivers and may not work if any are installed. Play nice, support each other and encourage learning. We are not tech support, these posts should be kept on /r/techsupportĭon't be a dick. Low-effort content will be removed at moderator discretion from security firms/pen testing companies is allowed within the confines of site-wide rules on self promotion found here, but will otherwise be considered spam. Spam is strictly forbidden and will result in a ban. Sharing of personal data is forbidden - no doxxing or IP dumping No "I got hacked" posts unless it's an interesting post-mortem of a unique attack. "How does HSTS prevent SSL stripping?" is a good question. Intermediate questions are welcomed - e.g. ![]() ![]() Offering to do these things will also result in a ban.Asking how to get into your "girlfriend's" instagram.This is not the place to try to find hackers to do your dirty work and you will be banned for trying. Discussion around the legality of issues is ok, encouraging or aiding illegal activities is not Hacking can be a grey area but keep it above board. "TeenagerĪrrested in Computer Crime Scandal", "Hacker Arrested after Bank Tampering". Guides and tutorials are welcome here as long as they are suitably complex and most importantly legal!īans are handed out at moderator discretion.Īnother one got caught today, it's all over the papers. This sub is aimed at those with an understanding of hacking - please visit /r/HowToHack for posting beginner links and tutorials any beginner questions should be directed there as they will result in a ban here. What we are about: quality and constructive discussion about the culture, profession and love of hacking. A subreddit dedicated to hacking and hacking culture.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |