GhostWriteExploit
Supporting code for exploiting the RISC-V GhostWrite vulnerability
Install / Use
/learn @LaurieWired/GhostWriteExploitREADME
GhostWrite Exploit :ghost:
Welcome to the GhostWrite Exploits repository, where we use the GhostWrite RISC-V CPU vulnerability to directly manipulate physical memory! :computer:
What is this repository? :mag_right:
This repository contains two PoCs for exploiting hardware vulnerabilities in the XuanTie C910 processor:
- System Crash PoC: Continuously writing junk data to physical memory, causing the system to crash.
- Inter-Process Memory Modification: Exploiting physical memory access to modify the memory of a separate running process.
These PoCs are based on the paper and research from GhostWriteAttack.com by researchers at the CISPA Helmholtz Center for Information Security.
Why is this important? :thinking:
- Hardware Vulnerabilities: Unlike software bugs, hardware vulnerabilities like GhostWrite are significantly harder to patch and may have no solution.
- Physical Memory Access: These PoCs demonstrate how access to physical memory can lead to system-wide control and crash scenarios.
- Learn & Experiment: If you're a student or researcher, you can experiment with these vulnerabilities using real hardware. This is your opportunity to understand hardware exploitation and the risks it poses.
Getting Started :runner:
Here's how to get started with the PoCs:
- Clone this repository:
git clone https://github.com/LaurieWired/GhostWriteExploit.git - Choose a folder:
- Crash PoC: Explore the folder
CrashSystem/to see how we crash the system by writing to physical memory. - Memory Modification PoC: Explore the folder
OverwriteProcess/to see how one process can directly modify the memory of another.
- Crash PoC: Explore the folder
- Build the code:
- To compile directly on the native RISC-V board:
gcc ghostwrite.c -o ghostwrite -march="rv64gzve64x" - Run the PoCs:
- Crash the system: Run the system crash executable and see the CPU bug in action.
- Modify another process's memory: Run the second PoC to witness how physical memory access can manipulate a separate process.
Accompanying Video :video_camera:
If you want more explanations of the vulnerability, watch the accompanying video on YouTube!
- GhostWrite Video: what happens when your CPU has a bug? (GhostWrite)
Related Skills
openhue
346.8kControl Philips Hue lights and scenes via the OpenHue CLI.
sag
346.8kElevenLabs text-to-speech with mac-style say UX.
weather
346.8kGet current weather and forecasts via wttr.in or Open-Meteo
tweakcc
1.6kCustomize Claude Code's system prompts, create custom toolsets, input pattern highlighters, themes/thinking verbs/spinners, customize input box & user message styling, support AGENTS.md, unlock private/unreleased features, and much more. Supports both native/npm installs on all platforms.
