SpecuCheck
https://github.com/ionescu007/SpecuCheck/releases(32/64位)
https://github.com/gentilkiwi/spectre_meltdown(64位)
Linux下可以使用多个工具,比如:
Meltdown checker
https://github.com/raphaelsc/Am-I-affected-by-Meltdown
https://github.com/ssstonebraker/meltdown_specre
https://github.com/paboldin/meltdown-exploit
MacOS下可使用多个工具,比如:
https://github.com/hackernix/CVE-2017-5754
https://github.com/xsscx/cve-2017-5753
测试参考:
https://gist.github.com/ErikAugust/724d4a969fb2c6ae1bbd7b2a9e3d4bb6
![图片[1]-CPU Vulnerability Detection Tools Guide](https://www.77169.net/wp-content/uploads/2018/01/1-28.jpg)
表明未打补丁或采取缓解措施,存在风险。
Spectre测试结果:
![图片[2]-CPU Vulnerability Detection Tools Guide](https://www.77169.net/wp-content/uploads/2018/01/1-29.jpg)
The Magic Words are Squeamish Ossifrage.存在风险。
打完操作系统补丁后,再运行可看到缓解措施开启情况:
![图片[3]-CPU Vulnerability Detection Tools Guide](https://www.77169.net/wp-content/uploads/2018/01/1-30.jpg)
![图片[4]-CPU Vulnerability Detection Tools Guide](https://www.77169.net/wp-content/uploads/2018/01/1-31.jpg)
System affected! Please consider upgrading your kernel to one that is patched with KAISER
表示存在风险,需要采取缓解措施。
Spectre测试,先运行gcc spectre.c -o specre编译源码,然后运行./specre:
![图片[5]-CPU Vulnerability Detection Tools Guide](https://www.77169.net/wp-content/uploads/2018/01/1-32.jpg)
The Magic Words are Squeamish Ossifrage.存在风险。
测试MELTDOWN EXPLOIT POC,先make编译源码,然后运行./run.sh即可:
![图片[6]-CPU Vulnerability Detection Tools Guide](https://www.77169.net/wp-content/uploads/2018/01/1-33.jpg)
升级内核版本(Ubuntu 16.04.3 4.10.0-28升级倒4.4.110-0404110)测试:
![图片[7]-CPU Vulnerability Detection Tools Guide](https://www.77169.net/wp-content/uploads/2018/01/1-34.jpg)
![图片[8]-CPU Vulnerability Detection Tools Guide](https://www.77169.net/wp-content/uploads/2018/01/1-35.jpg)
![图片[9]-CPU Vulnerability Detection Tools Guide](https://www.77169.net/wp-content/uploads/2018/01/1-36.jpg)
Spectre测试结果:
![图片[10]-CPU Vulnerability Detection Tools Guide](https://www.77169.net/wp-content/uploads/2018/01/1-37.jpg)














暂无评论内容