i try fix exploit what forse vm exit on cpu id 0 in rdtsc
What is the source of this supposed exploit? Do you have a CVE reference?
this sample code detect if run in vm ware
How? It is just a random code snippet with no definitive indication of what language it is in.
i try find how to fix this , but no result
Not surprising. The only search result I get is this thread!
sample what been on vbox . vbox: disable rdtsc VM exit · cnuke/genode@85175fe · GitHub
Well that appears to be about mitigating audio recording problems due to CPU overload when trapping RDTSC so what is the connection?
->>> program what detect if in vmware with this exploit GitHub - a0rtega/pafish: Pafish is a demonstration tool that employs several techniques to detect sandboxes and analysis…
Posting the output of this tool here may enlighten us on what this is all about.