{"id":33685,"date":"2024-07-08T06:20:58","date_gmt":"2024-07-08T06:20:58","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=33685"},"modified":"2024-07-08T06:21:00","modified_gmt":"2024-07-08T06:21:00","slug":"pathfinder","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/pathfinder\/","title":{"rendered":"Pathfinder : High-Resolution Control-Flow Attacks Exploiting The Conditional Branch Predictor"},"content":{"rendered":"\n<p>Researchers delve into the vulnerabilities inherent in Intel&#8217;s branch prediction algorithms. <\/p>\n\n\n\n<p>Highlighting novel control-flow attacks, the study showcases techniques that leverage the Conditional Branch Predictor to manipulate and observe path history in modern CPUs. <\/p>\n\n\n\n<p>This pivotal research, conducted by experts from the University of California San Diego, opens new avenues for understanding and securing microarchitectural operations against potential exploits.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>System Requirements<\/strong><a href=\"https:\/\/github.com\/hoseinyavarzadeh\/Pathfinder_Attack#system-requirements\"><\/a><\/h2>\n\n\n\n<p>Intel 12\/13\/14th Gen Intel CPUs (P-core)<\/p>\n\n\n\n<p>Note: All the attacks can be extended to previous generations of Intel CPUs, but the code must be adjusted according to the Conditional Branch Predictor (CBP) structure. To know more about this, please refer to our previous.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Step 1: Clone!<\/strong><a href=\"https:\/\/github.com\/hoseinyavarzadeh\/Pathfinder_Attack#step-1-clone\"><\/a><\/h2>\n\n\n\n<p>To clone the repository and its submodules, use the git clone &#8211;recursive command:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>git clone --recursive https:\/\/github.com\/hoseinyavarzadeh\/pathfinder_source.git<a href=\"https:\/\/github.com\/hoseinyavarzadeh\/Pathfinder_Attack#pathfinder-high-resolution-control-flow-attacks-exploiting-the-conditional-branch-predictor\"><\/a><\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Step 2: Necessary Installations<\/strong><a href=\"https:\/\/github.com\/hoseinyavarzadeh\/Pathfinder_Attack#step-2-necessary-installations\"><\/a><\/h2>\n\n\n\n<p>In order to install required packages and drivers for performance counters run the following commands in the terminal after cloning the github repo. Without Installing the required packages\/drivers it will not work.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>chmod a+x *.sh\n.\/install.sh<\/code><\/pre>\n\n\n\n<p>Step 3: Let&#8217;s Run the PHR Attack!<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>.\/run.sh<\/code><\/pre>\n\n\n\n<p>A reasonable result should look like this (with some possible variations). Every digit shows a doublet of the Path History Register (PHR).<\/p>\n\n\n\n<p>A doublet is a 2-bit value, and within the PHR, it represents pairs of adjacent bits.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>PHR (lsb to msb): 3 1 1 2 3 3 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0<\/code><\/pre>\n\n\n\n<p>For more information click <a href=\"https:\/\/github.com\/hoseinyavarzadeh\/Pathfinder_Attack\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Researchers delve into the vulnerabilities inherent in Intel&#8217;s branch prediction algorithms. Highlighting novel control-flow attacks, the study showcases techniques that leverage the Conditional Branch Predictor to manipulate and observe path history in modern CPUs. This pivotal research, conducted by experts from the University of California San Diego, opens new avenues for understanding and securing microarchitectural [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":33689,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh5glWQ_vah68SwLrhb6m5Sskq04pSD7lorv4pli0lO64AH5v0nx_xoyRxlyhF3-kB64Fd6SxgHem8eAueV9pE4LcIimld4xm7vppC2oasxojHrOhv4jIW9XMzZWSfmssP3qALNetqcvpwqrV4BIGAgwFbugBL47Y5QYyJ66VAQ83SqyeJARtQkaN84L7TO\/s16000\/Pathfinder%20.webp","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[20],"tags":[737,6321,6052,6325,6829],"class_list":["post-33685","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","tag-cybersecurity","tag-informationsecurity","tag-kalilinux","tag-kalilinuxtools","tag-pathfinder"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Pathfinder : High-Resolution Control-Flow Attacks Exploiting The<\/title>\n<meta name=\"description\" content=\"Researchers delve into the vulnerabilities inherent in Intel&#039;s branch prediction algorithms. Highlighting novel control-flow attacks, the\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/pathfinder\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Pathfinder : High-Resolution Control-Flow Attacks Exploiting The\" \/>\n<meta property=\"og:description\" content=\"Researchers delve into the vulnerabilities inherent in Intel&#039;s branch prediction algorithms. Highlighting novel control-flow attacks, the\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/pathfinder\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-08T06:20:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-08T06:21:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh5glWQ_vah68SwLrhb6m5Sskq04pSD7lorv4pli0lO64AH5v0nx_xoyRxlyhF3-kB64Fd6SxgHem8eAueV9pE4LcIimld4xm7vppC2oasxojHrOhv4jIW9XMzZWSfmssP3qALNetqcvpwqrV4BIGAgwFbugBL47Y5QYyJ66VAQ83SqyeJARtQkaN84L7TO\/s16000\/Pathfinder%20.webp\" \/>\n<meta name=\"author\" content=\"Varshini\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh5glWQ_vah68SwLrhb6m5Sskq04pSD7lorv4pli0lO64AH5v0nx_xoyRxlyhF3-kB64Fd6SxgHem8eAueV9pE4LcIimld4xm7vppC2oasxojHrOhv4jIW9XMzZWSfmssP3qALNetqcvpwqrV4BIGAgwFbugBL47Y5QYyJ66VAQ83SqyeJARtQkaN84L7TO\/s16000\/Pathfinder%20.webp\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Varshini\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/pathfinder\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/pathfinder\/\"},\"author\":{\"name\":\"Varshini\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\"},\"headline\":\"Pathfinder : High-Resolution Control-Flow Attacks Exploiting The Conditional Branch Predictor\",\"datePublished\":\"2024-07-08T06:20:58+00:00\",\"dateModified\":\"2024-07-08T06:21:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/pathfinder\/\"},\"wordCount\":215,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/pathfinder\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh5glWQ_vah68SwLrhb6m5Sskq04pSD7lorv4pli0lO64AH5v0nx_xoyRxlyhF3-kB64Fd6SxgHem8eAueV9pE4LcIimld4xm7vppC2oasxojHrOhv4jIW9XMzZWSfmssP3qALNetqcvpwqrV4BIGAgwFbugBL47Y5QYyJ66VAQ83SqyeJARtQkaN84L7TO\/s16000\/Pathfinder%20.webp\",\"keywords\":[\"cybersecurity\",\"informationsecurity\",\"kalilinux\",\"kalilinuxtools\",\"Pathfinder\"],\"articleSection\":[\"Cyber security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/pathfinder\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/pathfinder\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/pathfinder\/\",\"name\":\"Pathfinder : High-Resolution Control-Flow Attacks Exploiting The\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/pathfinder\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/pathfinder\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh5glWQ_vah68SwLrhb6m5Sskq04pSD7lorv4pli0lO64AH5v0nx_xoyRxlyhF3-kB64Fd6SxgHem8eAueV9pE4LcIimld4xm7vppC2oasxojHrOhv4jIW9XMzZWSfmssP3qALNetqcvpwqrV4BIGAgwFbugBL47Y5QYyJ66VAQ83SqyeJARtQkaN84L7TO\/s16000\/Pathfinder%20.webp\",\"datePublished\":\"2024-07-08T06:20:58+00:00\",\"dateModified\":\"2024-07-08T06:21:00+00:00\",\"description\":\"Researchers delve into the vulnerabilities inherent in Intel's branch prediction algorithms. Highlighting novel control-flow attacks, the\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/pathfinder\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/pathfinder\/#primaryimage\",\"url\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh5glWQ_vah68SwLrhb6m5Sskq04pSD7lorv4pli0lO64AH5v0nx_xoyRxlyhF3-kB64Fd6SxgHem8eAueV9pE4LcIimld4xm7vppC2oasxojHrOhv4jIW9XMzZWSfmssP3qALNetqcvpwqrV4BIGAgwFbugBL47Y5QYyJ66VAQ83SqyeJARtQkaN84L7TO\/s16000\/Pathfinder%20.webp\",\"contentUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh5glWQ_vah68SwLrhb6m5Sskq04pSD7lorv4pli0lO64AH5v0nx_xoyRxlyhF3-kB64Fd6SxgHem8eAueV9pE4LcIimld4xm7vppC2oasxojHrOhv4jIW9XMzZWSfmssP3qALNetqcvpwqrV4BIGAgwFbugBL47Y5QYyJ66VAQ83SqyeJARtQkaN84L7TO\/s16000\/Pathfinder%20.webp\",\"width\":\"1600\",\"height\":\"900\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\",\"name\":\"Varshini\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"caption\":\"Varshini\"},\"description\":\"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.\",\"sameAs\":[\"http:\/\/kalilinuxtutorials.com\",\"https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/\"],\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Pathfinder : High-Resolution Control-Flow Attacks Exploiting The","description":"Researchers delve into the vulnerabilities inherent in Intel's branch prediction algorithms. Highlighting novel control-flow attacks, the","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/pathfinder\/","og_locale":"en_US","og_type":"article","og_title":"Pathfinder : High-Resolution Control-Flow Attacks Exploiting The","og_description":"Researchers delve into the vulnerabilities inherent in Intel's branch prediction algorithms. Highlighting novel control-flow attacks, the","og_url":"https:\/\/kalilinuxtutorials.com\/pathfinder\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2024-07-08T06:20:58+00:00","article_modified_time":"2024-07-08T06:21:00+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh5glWQ_vah68SwLrhb6m5Sskq04pSD7lorv4pli0lO64AH5v0nx_xoyRxlyhF3-kB64Fd6SxgHem8eAueV9pE4LcIimld4xm7vppC2oasxojHrOhv4jIW9XMzZWSfmssP3qALNetqcvpwqrV4BIGAgwFbugBL47Y5QYyJ66VAQ83SqyeJARtQkaN84L7TO\/s16000\/Pathfinder%20.webp","type":"","width":"","height":""}],"author":"Varshini","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh5glWQ_vah68SwLrhb6m5Sskq04pSD7lorv4pli0lO64AH5v0nx_xoyRxlyhF3-kB64Fd6SxgHem8eAueV9pE4LcIimld4xm7vppC2oasxojHrOhv4jIW9XMzZWSfmssP3qALNetqcvpwqrV4BIGAgwFbugBL47Y5QYyJ66VAQ83SqyeJARtQkaN84L7TO\/s16000\/Pathfinder%20.webp","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"Varshini","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/pathfinder\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/pathfinder\/"},"author":{"name":"Varshini","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa"},"headline":"Pathfinder : High-Resolution Control-Flow Attacks Exploiting The Conditional Branch Predictor","datePublished":"2024-07-08T06:20:58+00:00","dateModified":"2024-07-08T06:21:00+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/pathfinder\/"},"wordCount":215,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/pathfinder\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh5glWQ_vah68SwLrhb6m5Sskq04pSD7lorv4pli0lO64AH5v0nx_xoyRxlyhF3-kB64Fd6SxgHem8eAueV9pE4LcIimld4xm7vppC2oasxojHrOhv4jIW9XMzZWSfmssP3qALNetqcvpwqrV4BIGAgwFbugBL47Y5QYyJ66VAQ83SqyeJARtQkaN84L7TO\/s16000\/Pathfinder%20.webp","keywords":["cybersecurity","informationsecurity","kalilinux","kalilinuxtools","Pathfinder"],"articleSection":["Cyber security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/pathfinder\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/pathfinder\/","url":"https:\/\/kalilinuxtutorials.com\/pathfinder\/","name":"Pathfinder : High-Resolution Control-Flow Attacks Exploiting The","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/pathfinder\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/pathfinder\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh5glWQ_vah68SwLrhb6m5Sskq04pSD7lorv4pli0lO64AH5v0nx_xoyRxlyhF3-kB64Fd6SxgHem8eAueV9pE4LcIimld4xm7vppC2oasxojHrOhv4jIW9XMzZWSfmssP3qALNetqcvpwqrV4BIGAgwFbugBL47Y5QYyJ66VAQ83SqyeJARtQkaN84L7TO\/s16000\/Pathfinder%20.webp","datePublished":"2024-07-08T06:20:58+00:00","dateModified":"2024-07-08T06:21:00+00:00","description":"Researchers delve into the vulnerabilities inherent in Intel's branch prediction algorithms. Highlighting novel control-flow attacks, the","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/pathfinder\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/pathfinder\/#primaryimage","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh5glWQ_vah68SwLrhb6m5Sskq04pSD7lorv4pli0lO64AH5v0nx_xoyRxlyhF3-kB64Fd6SxgHem8eAueV9pE4LcIimld4xm7vppC2oasxojHrOhv4jIW9XMzZWSfmssP3qALNetqcvpwqrV4BIGAgwFbugBL47Y5QYyJ66VAQ83SqyeJARtQkaN84L7TO\/s16000\/Pathfinder%20.webp","contentUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh5glWQ_vah68SwLrhb6m5Sskq04pSD7lorv4pli0lO64AH5v0nx_xoyRxlyhF3-kB64Fd6SxgHem8eAueV9pE4LcIimld4xm7vppC2oasxojHrOhv4jIW9XMzZWSfmssP3qALNetqcvpwqrV4BIGAgwFbugBL47Y5QYyJ66VAQ83SqyeJARtQkaN84L7TO\/s16000\/Pathfinder%20.webp","width":"1600","height":"900"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa","name":"Varshini","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","caption":"Varshini"},"description":"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.","sameAs":["http:\/\/kalilinuxtutorials.com","https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/"],"url":"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/"}]}},"jetpack_featured_media_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh5glWQ_vah68SwLrhb6m5Sskq04pSD7lorv4pli0lO64AH5v0nx_xoyRxlyhF3-kB64Fd6SxgHem8eAueV9pE4LcIimld4xm7vppC2oasxojHrOhv4jIW9XMzZWSfmssP3qALNetqcvpwqrV4BIGAgwFbugBL47Y5QYyJ66VAQ83SqyeJARtQkaN84L7TO\/s16000\/Pathfinder%20.webp","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":36128,"url":"https:\/\/kalilinuxtutorials.com\/ucodedisasm\/","url_meta":{"origin":33685,"position":0},"title":"uCodeDisasm : The Intricacies Of Intel Atom Microcode","author":"Varshini","date":"February 5, 2025","format":false,"excerpt":"The \"uCodeDisasm\" tool is a Python-based microcode disassembler designed to analyze and interpret the binary microcode of Intel Atom processors, specifically the Goldmont microarchitecture. This tool is a significant breakthrough for researchers in CPU security, performance optimization, and reverse engineering, as it provides a detailed, readable representation of Intel's otherwise\u2026","rel":"","context":"In &quot;Forensics&quot;","block_context":{"text":"Forensics","link":"https:\/\/kalilinuxtutorials.com\/category\/f\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/uCodeDisasm.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/uCodeDisasm.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/uCodeDisasm.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/uCodeDisasm.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/uCodeDisasm.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/uCodeDisasm.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":12504,"url":"https:\/\/kalilinuxtutorials.com\/cpufetch\/","url_meta":{"origin":33685,"position":1},"title":"CPUFetch : Simplistic Yet Fancy CPU Architecture Fetching Tool","author":"R K","date":"April 21, 2021","format":false,"excerpt":"CPUFetch is a simple yet fancy CPU architecture fetching tool. Support cpufetch supports x86, x86_64 (Intel and AMD) and ARM. Platformx86_64ARMNotesGNU\/Linux\u2714\ufe0f\u2714\ufe0fBest supportWindows\u2714\ufe0f\u274cSome information may be missing.Colors will be used if supportedAndroid\u2757\u2714\ufe0fSome information may be missing.Not tested under x86_64macOS\u2714\ufe0f\u274cSome information may be missing.Apple M1 support may be addedin the future (see\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":37403,"url":"https:\/\/kalilinuxtutorials.com\/modeflattener\/","url_meta":{"origin":33685,"position":2},"title":"MODeflattener &#8211; Miasm&#8217;s OLLVM Deflattener","author":"Varshini","date":"March 31, 2025","format":false,"excerpt":"MODeflattener is a specialized tool designed to reverse OLLVM's control flow flattening obfuscation through static analysis techniques. Developed using Miasm's intermediate representation capabilities, it systematically reconstructs the original program logic from obfuscated binaries by analyzing and patching key structural components. Core Functionality Control Flow DeobfuscationThe tool identifies two critical components\u2026","rel":"","context":"In &quot;Exploitation Tools&quot;","block_context":{"text":"Exploitation Tools","link":"https:\/\/kalilinuxtutorials.com\/category\/et\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/MODeflattener-.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/MODeflattener-.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/MODeflattener-.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/MODeflattener-.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/MODeflattener-.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/MODeflattener-.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":36983,"url":"https:\/\/kalilinuxtutorials.com\/cpumicrocodes\/","url_meta":{"origin":33685,"position":3},"title":"CPUMicrocodes : A Gateway To Advanced CPU Microcode Management And Optimization","author":"Varshini","date":"March 11, 2025","format":false,"excerpt":"CPUMicrocodes is a comprehensive repository of microcodes for Intel, AMD, VIA, and Freescale CPUs. Microcode is a low-level firmware that translates machine code instructions into hardware-specific operations, playing a crucial role in CPU functionality, performance, and compatibility. The CPUMicrocodes repository is essential for upgrading, research, and development purposes, providing access\u2026","rel":"","context":"In &quot;Hacking Tools&quot;","block_context":{"text":"Hacking Tools","link":"https:\/\/kalilinuxtutorials.com\/category\/hacking-tools\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/CPUMicrocodes-.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/CPUMicrocodes-.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/CPUMicrocodes-.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/CPUMicrocodes-.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/CPUMicrocodes-.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/CPUMicrocodes-.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":35360,"url":"https:\/\/kalilinuxtutorials.com\/linux-6-13-rc1-released-whats-new\/","url_meta":{"origin":33685,"position":4},"title":"Linux 6.13-rc1 Released : What\u2019s New!","author":"Varshini","date":"December 2, 2024","format":false,"excerpt":"Linux kernel 6.13-rc1 has been released by Linus Torvalds, marking the end of the two-week merge window and the beginning of the stabilization phase for this kernel version. This release brings a multitude of new features and improvements across various subsystems Key Features And Improvements CPU And Hardware Support AMD\u2026","rel":"","context":"In \"6.13-rc1 Features\"","block_context":{"text":"6.13-rc1 Features","link":"https:\/\/kalilinuxtutorials.com\/tag\/6-13-rc1-features\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgHXHFcDvS-cIc31MnRAfXq75bw7SuUofHNd-PPsfitWCMzldnA6AdqB-8LjjI2nt01UPfL8eayy4NUUowgU_mKTRtREmNsH2geeFyCLx9_yJV4exnslCSOBM4lyJ7Ig-uEK_M_1GKW4Makl0lt0woVc6FC8fhNJqL44hoUHhK2pnoITYGmnJXrcATgk2wg\/s1600\/Linux%206.13-rc1%20Released%20What%E2%80%99s%20New%21.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgHXHFcDvS-cIc31MnRAfXq75bw7SuUofHNd-PPsfitWCMzldnA6AdqB-8LjjI2nt01UPfL8eayy4NUUowgU_mKTRtREmNsH2geeFyCLx9_yJV4exnslCSOBM4lyJ7Ig-uEK_M_1GKW4Makl0lt0woVc6FC8fhNJqL44hoUHhK2pnoITYGmnJXrcATgk2wg\/s1600\/Linux%206.13-rc1%20Released%20What%E2%80%99s%20New%21.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgHXHFcDvS-cIc31MnRAfXq75bw7SuUofHNd-PPsfitWCMzldnA6AdqB-8LjjI2nt01UPfL8eayy4NUUowgU_mKTRtREmNsH2geeFyCLx9_yJV4exnslCSOBM4lyJ7Ig-uEK_M_1GKW4Makl0lt0woVc6FC8fhNJqL44hoUHhK2pnoITYGmnJXrcATgk2wg\/s1600\/Linux%206.13-rc1%20Released%20What%E2%80%99s%20New%21.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgHXHFcDvS-cIc31MnRAfXq75bw7SuUofHNd-PPsfitWCMzldnA6AdqB-8LjjI2nt01UPfL8eayy4NUUowgU_mKTRtREmNsH2geeFyCLx9_yJV4exnslCSOBM4lyJ7Ig-uEK_M_1GKW4Makl0lt0woVc6FC8fhNJqL44hoUHhK2pnoITYGmnJXrcATgk2wg\/s1600\/Linux%206.13-rc1%20Released%20What%E2%80%99s%20New%21.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgHXHFcDvS-cIc31MnRAfXq75bw7SuUofHNd-PPsfitWCMzldnA6AdqB-8LjjI2nt01UPfL8eayy4NUUowgU_mKTRtREmNsH2geeFyCLx9_yJV4exnslCSOBM4lyJ7Ig-uEK_M_1GKW4Makl0lt0woVc6FC8fhNJqL44hoUHhK2pnoITYGmnJXrcATgk2wg\/s1600\/Linux%206.13-rc1%20Released%20What%E2%80%99s%20New%21.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgHXHFcDvS-cIc31MnRAfXq75bw7SuUofHNd-PPsfitWCMzldnA6AdqB-8LjjI2nt01UPfL8eayy4NUUowgU_mKTRtREmNsH2geeFyCLx9_yJV4exnslCSOBM4lyJ7Ig-uEK_M_1GKW4Makl0lt0woVc6FC8fhNJqL44hoUHhK2pnoITYGmnJXrcATgk2wg\/s1600\/Linux%206.13-rc1%20Released%20What%E2%80%99s%20New%21.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":7234,"url":"https:\/\/kalilinuxtutorials.com\/sgx-step-a-practical-attack-framework\/","url_meta":{"origin":33685,"position":5},"title":"SGX-Step : A Practical Attack Framework For Precise Enclave Execution Control","author":"R K","date":"November 12, 2019","format":false,"excerpt":"SGX-Step is an open-source framework to facilitate side-channel attack research on Intel SGX platforms. SGX-Step consists of an adversarial Linux kernel driver and user space library that allow to configure untrusted page table entries and\/or x86 APIC timer interrupts completely from user space. Our research results have demonstrated several new\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/33685","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=33685"}],"version-history":[{"count":3,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/33685\/revisions"}],"predecessor-version":[{"id":33688,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/33685\/revisions\/33688"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/33689"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=33685"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=33685"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=33685"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}