In-Spectre-Meltdown - Tool to identify Meltdown & Spectre Vulnerabilities in processors



This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CVE-2017-5754 (Meltdown) and CVE-2017-5715 (Spectre) allows unprivileged processes to steal secrets from privileged processes. These attacks present 3 different ways of attacking data protection measures on CPUs enabling attackers to read data they shouldn't be able to.




Please note:
This solution has been tested successfully using Python 3.6.3 & PowerShell version 5.1.

How do I use this?
  • Run the python code or download the executable from the releases section and run it as an administrator user.
  • Press Number 1, 2, 3 & 4 in sequence to see the results.
  • Press 1: Sets the execution policy to unrestricted.
  • Press 2: Imports necessary PowerShell modules
  • Press 3: Installs Spectre related modules within PowerShell
  • Press 4: Inspects control settings for Spectre & Meltdown and displays result
  • Press 5: Exit from the program

Do I need to run the executable as administrator?
  • Yes, Right click on the "In-Spectre_meltdown.exe" and run as administrator to get the results.

Questions?
Twitter: https://twitter.com/maniarviral
LinkedIn: https://au.linkedin.com/in/viralmaniar



Source: feedproxy.google.com
In-Spectre-Meltdown - Tool to identify Meltdown & Spectre Vulnerabilities in processors In-Spectre-Meltdown - Tool to identify Meltdown & Spectre Vulnerabilities in processors Reviewed by Anonymous on 12:10 PM Rating: 5