To install click the Add extension button. That's it.

The source code for the WIKI 2 extension is being checked by specialists of the Mozilla Foundation, Google, and Apple. You could also do it yourself at any point in time.

4,5
Kelly Slayton
Congratulations on this excellent venture… what a great idea!
Alexander Grigorievskiy
I use WIKI 2 every day and almost forgot how the original Wikipedia looks like.
Live Statistics
English Articles
Improved in 24 Hours
Added in 24 Hours
Languages
Recent
Show all languages
What we do. Every page goes through several hundred of perfecting techniques; in live mode. Quite the same Wikipedia. Just better.
.
Leo
Newton
Brights
Milds

Blue Pill (software)

From Wikipedia, the free encyclopedia

Blue Pill is the codename for a rootkit based on x86 virtualization. Blue Pill originally required AMD-V (Pacifica) virtualization support, but was later ported to support Intel VT-x (Vanderpool) as well. It was designed by Joanna Rutkowska and originally demonstrated at the Black Hat Briefings on August 3, 2006, with a reference implementation for the Microsoft Windows Vista kernel.

The name is a reference to the red pill and blue pill concept from the 1999 film The Matrix.

YouTube Encyclopedic

  • 1/3
    Views:
    7 968
    33 091
    40 828
  • The Blue Pill Pipeline - MGTOW
  • Flat Earth 101: "The Red-Pill Discussion"
  • A Closer Look At Candace Owens’ (Red Pill Black) Doxing Site SocialAutopsy.com

Transcription

Overview

The Blue Pill concept is to trap a running instance of the operating system by starting a thin hypervisor and virtualizing the rest of the machine under it. The previous operating system would still maintain its existing references to all devices and files, but nearly anything, including hardware interrupts, requests for data and even the system time could be intercepted (and a fake response sent) by the hypervisor. The original concept of Blue Pill was published by another researcher at IEEE Oakland in May 2006, under the name VMBR (virtual-machine based rootkit).[1]

Rutkowska claims that, since any detection program could be fooled by the hypervisor, such a system could be "100% undetectable". Since AMD virtualization is seamless by design, a virtualized guest is not supposed to be able to query whether it is a guest or not. Therefore, the only way Blue Pill could be detected is if the virtualization implementation were not functioning as specified.[2]

This assessment, repeated in numerous press articles, is disputed: AMD issued a statement dismissing the claim of full undetectability.[3] Some other security researchers and journalists also dismissed the concept as implausible.[4] Virtualization could be detected by a timing attack relying on external sources of time.[5]

In 2007, a group of researchers challenged Rutkowska to put Blue Pill against their rootkit detector software at that year's Black Hat conference,[6] but the deal was deemed a no-go following Rutkowska's request for $384,000 in funding as a prerequisite for entering the competition.[7] Rutkowska and Alexander Tereshkin countered detractors' claims during a subsequent Black Hat speech, arguing that the proposed detection methods were inaccurate.[8]

The source code for Blue Pill has since been made public,[9][10] under the following license: Any unauthorized use (including publishing and distribution) of this software requires a valid license from the copyright holder. This software has been provided for the educational use only during the Black Hat training and conference.[11]

Red Pill

Red Pill is a technique to detect the presence of a virtual machine also developed by Joanna Rutkowska.[12]

References

  1. ^ King, S. T.; Chen, P. M. (2006). "SubVirt: implementing malware with virtual machines". 2006 IEEE Symposium on Security and Privacy (S&P'06). pp. 14 pp. doi:10.1109/SP.2006.38. ISBN 0-7695-2574-1. S2CID 1349303.
  2. ^ 'Blue Pill' Prototype Creates 100% Undetectable Malware[permanent dead link], Ryan Naraine, eWeek.com
  3. ^ Faceoff: AMD vs. Joanna Rutkowska Archived 2008-05-04 at the Wayback Machine, eWeek.com
  4. ^ Debunking Blue Pill Myth Archived 2010-02-14 at the Wayback Machine, virtualization.info
  5. ^ "- Showdown at the Blue Pill Corral - eWeek Security Watch". Archived from the original on 2012-02-06. Retrieved 2007-08-20.
  6. ^ Rutkowska faces ‘100% undetectable malware’ challenge, Ryan Naraine at zdnet.com Archived September 3, 2009, at the Wayback Machine
  7. ^ Naraine, Ryan (2007-06-29). "Blue Pill hacker challenge update: It's a no-go". zdnet.com. ZDNet. Archived from the original on 2009-11-26. Retrieved 2016-01-24. Rutkowska [...] wants her two-person team to be paid $384,000 ($200/hr each for two people working full-time for six months) [...] Matasano's Thomas Ptacek, a member of the challenge team, provides this apt response: 'Why would we pay you $384,000 to buy a rootkit we already know we can detect?'
  8. ^ Showdown at the Blue Pill Corral
  9. ^ Blue Pill 2007 Archived October 5, 2009, at the Wayback Machine
  10. ^ Blue Pill 2008 Archived September 13, 2011, at the Wayback Machine
  11. ^ "bluepillproject.org". 18 April 2008. Archived from the original on 18 April 2008. Retrieved 3 September 2017.{{cite web}}: CS1 maint: bot: original URL status unknown (link)
  12. ^ "Blog | the Invisible Things". Archived from the original on 2007-09-11. Retrieved 2007-09-11.

External links

This page was last edited on 26 March 2023, at 02:12
Basis of this page is in Wikipedia. Text is available under the CC BY-SA 3.0 Unported License. Non-text media are available under their specified licenses. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc. WIKI 2 is an independent company and has no affiliation with Wikimedia Foundation.