76 Followers
290 Following
496 Posts

#python #rust #golang #infosec #security #containers #kubernetes #openshift #networks #linux #fedora #arch #debian #foss #devsecops

Running a startup focussed on DevSecOps for the Cyber Resilience Act (#CRA) #cyberresilienceact

Creator and maintainer of https://pypi.org/project/netflow, the netflow/IPFIX library for Python

Creator of https://addons.thunderbird.net/en-US/thunderbird/addon/arcus/, a Rust-based encryption addon that uses rage and WebAssembly

Co-founder of @fsfwdresden and Bits&BΓ€ume Dresden

Talk about nftables and WireGuard (in german) https://www.youtube.com/watch?v=PoMUtc-YLno

πŸ§‘β€πŸ’» formerly Software & Security freelancer
πŸ”‘ formerly Product Owner for Security and Operations @ @sovereigncloudstack
πŸ‘¨β€πŸŽ“ formerly computer science @ TU Dresden
πŸ’° formerly information security @ #finance sector in Frankfurt

#Europe πŸ‡ͺπŸ‡Ί
#Philosophy
#Environment
#Photography

Bloghttps://bitkeks.eu/blog
Languagesde / en / es
Einmal im Jahr darf sie raus. #38C3

Just tested #zenbleed between two KVM/QEMU VMs. It worked.. πŸ€¨β€‹

Scenario:
OS running two Ubuntu 22.04 live systems. VMs share a CPU core from the host. Victim VM is running curl against localhost nginx with "Bearer" auth header. Attacker VM only runs zenbleed PoC.

Zenbleed PoC captures the client's header string FROM THE OTHER VM. πŸ’£β€‹

The VMs ONLY share a host hardware CPU core, nothing else.

From my POV this shows that it is possible to capture client credentials from other VMs on the same host, given some time.

What the f?

#amd #zenbleed #security #kvm #qemu