Jump to content

Sampei.Nihira

Member
  • Posts

    1,282
  • Joined

  • Last visited

  • Days Won

    30
  • Donations

    0.00 USD 
  • Country

    Italy

Everything posted by Sampei.Nihira

  1. https://www.wilderssecurity.com/threads/tls-1-1-and-browser-upgrades.404679/#post-2762861 The Microsoft Update is OK.
  2. I wonder if it is advisable to disable the 3 specific insecure cipher? https://support.microsoft.com/en-us/help/245030/how-to-restrict-the-use-of-certain-cryptographic-algorithms-and-protoc
  3. The current version of Process Explorer (16.21) although it seems to work on XP reports incorrect values. It is preferable to use the version 16.12.
  4. I have disabled the SMB1 protocol. Others do what's best for them.
  5. https://www.bleepingcomputer.com/news/security/nsa-exploits-ported-to-work-on-all-windows-versions-released-since-windows-2000/
  6. Can you enter the procedure you followed to get this result? TH. Can you open the website below? https://www.inail.it/cs/internet/home.html
  7. Better to install MalwareBytes Anti-Exploit + OSArmor ver 1.4 now test 32 (with Anti-Exploit functionality): Pedro Bustamante said: https://forums.malwarebytes.com/topic/218897-meltdownspectre-javascript-web-browsers-and-mbae/?tab=comments#comment-1201018 https://www.wilderssecurity.com/threads/novirusthanks-osarmor-an-additional-layer-of-defense.398859/ both lightweight and compatible with XP.
  8. Correct. Pentium Pro is the first processor to use the Speculative Execution. . https://en.wikipedia.org/wiki/Pentium_Pro
  9. Intel Celeron M380 with FSB: Vulnerable to Spectre. Pentium Dual Core E6700 with FSB: Vulnerable to Spectre. _________________________________________ http://www.securityweek.com/malware-exploiting-spectre-meltdown-flaws-emerges
  10. I can not make it this with the Pentium Dual Core E6700 The characters for each cache (20-400) value are always "?". Can I start both spectre-sse.exe and spectre-sse2.exe. ________________________________________________ In PC with XP (Pentium Celeron M380) it works without setting up cache. File Spectre-sse2.exe (and pause):
  11. Run simultaneously in the same PC: The one below is unreliable. Pentium Dual Core E6700 W.10 1709 x64:
  12. My PC W.10 1709 x64 + Microsoft Patch Intel Dual Core E6700 Vulnerable.
  13. TH. In fast CPUs the window closes automatically after a few seconds. Can you insert a manual closure? Example "press a key to end the program".
  14. Who says it is not vulnerable? At the moment it is not on the Intel List. This vulnerability affects the processors from the Pentium Pro 1995 (the first CPU to use speculative execution). The test below shows that my CPU is vulnerable: https://repl.it/repls/DeliriousGreenOxpecker
  15. https://github.com/gentilkiwi/spectre_meltdown/tree/master/ErikAugust_724d4a969fb2c6ae1bbd7b2a9e3d4bb6 Spectre.exe not work on Windows XP. and https://github.com/stephanvandekerkhof/cpp-spectre-meltdown-vulnerability-windows-test @Dibya Is it possible to recompile it? TH.
  16. For me the only test able to really verify the vulnerability of the CPU is the Poc of Erik August: https://gist.github.com/ErikAugust/724d4a969fb2c6ae1bbd7b2a9e3d4bb6 In the comments we note that some CPUs not vulnerables in the Intel List are instead exposed: P.S. Core 2 Duo has FSB !!
  17. The release date your CPU is june 2008. If Sandy Bridge (2011) is 2nd Generation Intel Core processors: https://en.wikipedia.org/wiki/Intel_Core#Sandy_Bridge_(2nd_gen)_microarchitecture-based and the CPU's Intel Core 2 Duo (2006) are part of the processor generations that preceded the First Generation Intel Core processors, https://communities.intel.com/message/519186#519186 your processor is part of the First Generation. In the best hypothesis. At the moment safe from the problem. I have not read an Intel Corporation note which states that having the FSB allows you to be safe from the problem.
  18. SpecuCheck does not works on XP. Must be recompiled. _______________________________________ Specucontrol and Ashampoo not works on XP. In addition both tools need Powershell and the NET Framework
  19. InSpectre ver 5. My situation: This 32-bit OS on Intel Processor: OS is Meltdown aware: No OS is Spectre aware: No OS Meltdown data: n/a OS Spectre data: n/a PCID/INVPCID instructions: No / No CPU microcode updated: Yes CPU is meltdown vulnerable: Yes This system's processor identification: Intel Celeron M processor / 1.60GHz P.S. Right click on the "ghosted " box symbol shown in Inspectre window. Then select "Tech details." It show you everything that "probe" was supposed to and much more.
×
×
  • Create New...