

if my system happens to be compromised, what will the attacker be able to do afterwards?.While trying to compromise an IT infrastructure, attackers usually try to first own a system then try to proceed to lateral movements in order to obtain further information and elevate their privileges. Thanks in particular to Xeno Kovah ( that pointed out that Microsoft Windows does not take profit of VT-d/IOMMU properties on a stock install so far (assumption that was confirmed by, in no particular order, Alex Ionescu ( Jeremiah Cox ( and Dave Weston ( Many thanks to them!).įinally thanks to Yuriy Bulygin ( for pointing out that some references were missing regarding existing hardware attacks. We are very pleased that this blogpost had a lot of feedbacks!
