조회 수 131 추천 수 0 댓글 0
?

단축키

Prev이전 문서

Next다음 문서

크게 작게 위로 아래로 댓글로 가기 인쇄
?

단축키

Prev이전 문서

Next다음 문서

크게 작게 위로 아래로 댓글로 가기 인쇄
Full-disk security isn't quite dead

At least monthly, it looks some vendor or techie promises to have broken a variation of a hard drive full-disk encryption (FDE) program scheme, while it's from Microsoft (my full-time company), BitLocker, open source favorite TrueCrypt, or some other variant. All of the storylines and also the ballyhoo are sufficient to make one ponder if FDE is dead.

The brief -- and marginally qualified -- reply is no. Should you have any kind of questions relating to where by and also the best way to work with Free VPN Provider, you possibly can e-mail us at our web-site. There really are a few of intelligent attacks, as well as applications to produce them simpler to display. Luckily there are simple methods to stop most of them. We are going to start, however, with the assault that does not have an simple shield.

[ A harmful Fb advertisement is redirecting users to fake anti-virus software. | Learn the best way to secure your systems with Roger Grimes' Security Advisor website and Security Central newsletter, both from InfoWorld. ]

Exploitation via FireWire

Fecund crypto- and password-cracking seller Passware lately pronounced that it could decode both BitLocker- and TrueCrypt-protected disc volumes utilizing the FireWire procedure. Theoretically, you can carry off related attacks with a DMA-enabled port, including PCI. These attacks may finally achieve success against any software crypto merchandise that will not utilize specialized hardware.

The protection I discussed earlier against cold-boot attacks may be used to defeat FireWire assaults. You may also conquer them by just disabling your FireWire port until needed. I inquired Sumin whether any of Passware's FDE-deciphering products can split right into a non-powered-on pc or whether the 1394 port was disabled. He explained, "No. We've got a brute force assault, but the encryption is quite protected when you have a good-enough password."

Sadly, in case you have PCI, PCMCIA, or connected card slots, somebody may slip in a FireWire adapter card, and it'll function in addition to an enabled FireWire port. I have noticed this strike manner demo, and I was amazed. Turning off all DMA-enabled ports is more challenging to do and may likely significantly change performance (and maybe OS stability), so I'm not certain I advocate it. Nonetheless, you can find protection of a wide range of port-memory strikes and mitigations across multiple programs. Should you-can't keep your powered-on computers physically secure when not being used, keep them run away or in hibernation setting.

Dmitry Sumin, president of Passware, confirmed the the headlines: "I think we can [crack] any of the favorite [software FDE merchandises]. It is a question of moment and creating the crucial-finding criteria."

The FireWire interface can often be enabled or disabled via a computer's BIOS settings or in Device Manager within Microsoft Windows. Most Linux and Unix flavours allow the FireWire port to be handicapped utilizing a boot up control swap, a re-compiled kernel, or a command-line instruction -- although the final option usually will not endure reboots. Most Mac help blogs propose unloading the AppleFWOHCI.kext kernel extension.

One solution to avoid storage assaults isn't to save the decryption key in ordinary memory. The Trusted Platform Module (TPM) chip in the Trustworthy Computing Group is an effort to provide greater safety to crypto secrets utilizing specific equipment. Most business-class computers now come with a TPM chip, and many crypto vendors can benefit from it, including Ms with BitLocker.

Cold-boot attack

In Feb 2008, a-team including Princeton's Dr. Edward Felton -- among the planet premier computer-security investigators -- used an interesting inherent house of pc storage to effectively hack BitLocker [PDF]. It turns out that pc memory chips may hold their contents from a couple of seconds to a few minutes following the computer's power is switched off. Further, decreasing the heat or freezing the processors empowers the items to remain in-play much longer -- enough period to be utilized in yet another specific investigation pc so the information could be copied to permanent storage. The strike team can then search for the primary BitLocker encryption key and unlock the information.

Browser Security Deeply Dive

The "cold boot" assault could very well be the most demanding assault to prevent on a computer without specialized crypto-hardware. The fault lies more with computer storage as opposed to concerned crypto. All applications-based crypto has to ultimately place the decryption key in regular memory in an unprotected state to ensure that it may be used to decrypt the hard disk drive. An opponent always has the choice to discover the unprotected important when he or she has a duplicate of memory to analyze.

This plan requires the opponent to somehow acquire the victim's pc while it's powering-down, just after it's powered down, or when it's coming back up from a suspended or standby condition. Subsequently the assailant has to freeze the processors, transfer them to another specialized computer, and use specially-built applications to get the key for the FDE cipher. If you're worried about this strike, ensure your alone, powered-on computers have good physical security; instead, consider using components crypto solutions that are resistant to cold-boot attacks.

Adjusting cool memory chips is not for the faint at-heart. Within the last two years, other researchers realized they could shoot storage on powered-up computers through the use of the 1394 FireWire interface available on many higher-end notebooks. Here's one discussion describing how exactly to decode BitLocker using the FireWire memory assault [PDF].

More Info it is possible to study:

List of Articles
번호 제목 글쓴이 날짜 조회 수
1363 May That New Jersey Traffic Ticket Transfer To California? MalorieHodgson95017 2015.10.04 130
1362 ‘Clash Of Clans' Top 5 Suggestions,Tricks And Approaches Mike47L37172085 2015.10.04 130
1361 ทีมข่าวแมนซิตี้รายงานว่า Sbothai ที่พวกเขานิยมเข้าไปลุ้นพนันบอลเป็นประจำที่เว็บthsbo333.comและข่าวที่ว่า RosaTebbutt930787 2015.10.05 130
1360 Đánh Giá Khách Sạn New Star Hạ Long SamU628517753326 2015.10.15 130
1359 First Speeding Ticket Given In 1899 To Electronic Taxi, To Get An Extreme 12 Mph! ErnestineIsbell532 2015.10.16 130
1358 . Nissan Tan Chong Electric Motor. www.pepcid.com 2015.10.16 130
1357 GTA 5 Geld Glitch NUBCecilia50950604 2015.10.16 130
1356 Порно Расказ Груповуха С Женой. BerndX8257291060373 2015.10.16 130
1355 Порновидео Зрелых Теток. KrisLaroche54141489 2015.10.17 130
1354 'El Jefe Infiltrado' Se Sumerge En El Mundo Del Reposo Con La Empresa De Colchones KatrinMcCorkindale4 2015.10.17 130
1353 Черно Белый Оральный Секс. NataliaLacy267177300 2015.10.17 130
1352 Die Cast Model Airplane Kits - The Way To Find & Purchase The Best Kit SylviaShores9649 2015.10.18 130
1351 Tips To Help You To Get Gone Bed Bugs MickiMansour6151 2015.10.18 130
1350 Tips To Choose The Right Conveyor Belt RondaQcm5830681599562 2015.10.18 130
1349 Office Supply Con: Toner Phoner MontyArek9679908019 2015.10.18 130
1348 헬스장 상황별 운동능력 실험 민준이파 2021.08.28 130
1347 remonty mieszkań warszawa Inną odmianą takich urządzeń bywają hannameduza 2021.11.04 130
1346 현직 경찰이 말하는 인천 남경이 안 올라간 이유 최호영 2021.11.21 130
1345 주호민 작가가 전생체험을 안믿는 이유 유승민 2021.12.07 130
1344 잠들기 전 핸드폰하는 유부남의 공포.gif 초록달걀 2021.12.10 130
Board Pagination Prev 1 ... 3157 3158 3159 3160 3161 3162 3163 3164 3165 3166 ... 3230 Next
/ 3230
XE1.7.11 Layout1.1.0