Home / Companies / Gremlin / Blog / Post Details
Content Deep Dive

Getting started with Time Travel attacks

Blog post from Gremlin

Post Details
Company
Date Published
Author
Andre Newman
Word Count
1,828
Language
English
Hacker News Points
-
Summary

Time Travel attacks involve manipulating the system clock of a target operating system to test the resilience of systems against time-based failure modes, which can be as disruptive as hardware or network failures. These attacks are conducted by altering the system time using the `settimeofday` syscall while optionally blocking NTP synchronization, requiring the SYS_TIME capability enabled by default when installing the Gremlin agent. Time Travel attacks can move the clock forward or backward, with parameters such as length, offset, and blast radius allowing for controlled experiments. As time-related issues like Daylight Savings Time, leap years, or end-of-epoch problems can significantly impact computing operations, Time Travel attacks help teams prepare for these scenarios by observing system behavior during simulated failures. The experiments enable identification and mitigation of potential issues in a controlled environment, thereby improving system reliability and ensuring compliance with security and operational standards. While these attacks are effective on host-based services, they require targeting the underlying host for containerized environments due to the shared system clock.