
Meltdown Exploits PoC.
Meltdown Exploit PoC is a Speculative optimizations execute code in a non-secure manner leaving data traces in microarchitecture such as cache.
How it works?
It works by using /proc/kallsyms to find system call table and checking whether the address of a system call found by exploiting MELTDOWN match the respective one in /proc/kallsyms.
What to do when you face this error “Unable to read /proc/kallsyms…”
That’s because your system may be preventing the program from reading kernel symbols in /proc/kallsyms due to /proc/sys/kernel/kptr_restrict set to 1. The following command will do the tricky:
1 |
sudo sh -c "echo 0 > /proc/sys/kernel/kptr_restrict" |
Use or Run:
1 2 3 |
git clone https://github.com/paboldin/meltdown-exploit && cd meltdown-exploit make ./run.sh |
Source: https://github.com/paboldin