Nvidia’s Mining Limiter Hacked (LHR) Hacked for Miners

Image
  Nvidia’s Mining Limiter Hacked LHR GPUs now can mine 70% more by Admin on August 17 The latest version of Ethereum Mining tool (NBMiner) managed to hack Nvidia’s LHR (Lite Hash Rate), limiting the miners’ hash rate. NBMiner manages to increase the performance of the GPUs with LHR up to 70%, although the developers recommend capping out at 68% for stability. This hack will work with the latest Nvidia drivers on Windows and Linux, although NBMiner currently supports only the EthHash algorithm, future updates may be included with other algorithms to mine with LHR enabled GPUs and also expected to get more performance through LHR enabled Graphic Cards. So this is not a good move for the gamers who are trying to buy the budget gaming graphics cards such as Nvidia’s RTX 3060 and RTX 3060 Ti will suddenly be a good choice for miners again fo the miners will pick the cards and there will be less stock in the market for gamers to buy. What is PrinNightmare Vulnerability

What is PrintNightmare Vulnerability and how to get rid of it?

 What is PrintNightmare Vulnerability and how to get rid of it?

PrintNightmare Vulnerability


What is PrintNightmare?


PrintNightmare (CVE-2021-34527) vulnerability will allow the attackers with a regular user account to take over a Server, which the Windows Print Spooler Service is running. Windows Print Spooler Service runs from windows defaults on either Server and client PC including domain controllers on Active Directory environment. Print Spooler Service is an important Windows service used to manage print jobs sent to the printer or print server.


 A team discovered this zero-day vulnerability and they published in a tweet regarding the fix for the vulnerability,


“We deleted the POC of PrintNightmare. To mitigate this vulnerability, please update Windows to the latest version, or disable the Spooler service. For more RCE and LPE in Spooler, stay tuned and wait our Blackhat talk.”


So as the tweet Windows already released their Security Patches for PrintNightmare vulnerability along with the latest Windows Updates.


PrintNightmare looks for the DLLs such as kernelbase.dll, unidrv.dll, and other DLLs which written inside subfolders of “C:Windows/System32/Spool/drivers”. 


Windows Updates and Patches 


PrintNightmare Fix


You will get patches for PrintNightmare vulnerability if you check on Windows Updates you might receive with Mandatory Security Patches to be updated. These patches were released for Windows 10 from version 1809 to the latest and supported for Windows 7, 8.1, Windows Server 2008, 2012, and other versions. These patches were a fix for the PrintNightmare flaw in Print Spooler Service.


According to some Security Researchers, the above patch can be bypassed though as per Microsoft itself, these patches can be bypassed only for the users who modify system registry values. 


Vulnerability Fix

Users are forced to disable “Print Spooler Service” on clients and servers which do not require any print services. However, if you cannot disable Print Spooler Service users are able to Disable inbound remote printing through Group Policy.



How to Disable Print Spooler service

Open Powershell and type the following commands to Disable the service


Stop-Service -Name Spooler -Force 


Set-Service -Name Spooler -StartupType Disabled


Disable inbound remote printing through Group Policy


- Open Run Command  (Windows+R) 


- Type “gpedit.msc” and Enter


From the Group Policy navigate to the following location 


(Computer Configuration/Administrative Templates / Printers)


- Disable the “Allow Print Spooler to accept client connections” 


This will block any inbound attacks through the Print Spooler service, so the system will not function as a print server but it will not interrupt local printing which directly connected to the PC.


Comments

Popular posts from this blog

How to remove unremovable apps in Windows 10?

10 Things to do on your New Laptop