조회 수 131 추천 수 0 댓글 0
?

단축키

Prev이전 문서

Next다음 문서

크게 작게 위로 아래로 댓글로 가기 인쇄
?

단축키

Prev이전 문서

Next다음 문서

크게 작게 위로 아래로 댓글로 가기 인쇄
Full-disk security isn't quite dead

At least monthly, it looks some vendor or techie promises to have broken a variation of a hard drive full-disk encryption (FDE) program scheme, while it's from Microsoft (my full-time company), BitLocker, open source favorite TrueCrypt, or some other variant. All of the storylines and also the ballyhoo are sufficient to make one ponder if FDE is dead.

The brief -- and marginally qualified -- reply is no. Should you have any kind of questions relating to where by and also the best way to work with Free VPN Provider, you possibly can e-mail us at our web-site. There really are a few of intelligent attacks, as well as applications to produce them simpler to display. Luckily there are simple methods to stop most of them. We are going to start, however, with the assault that does not have an simple shield.

[ A harmful Fb advertisement is redirecting users to fake anti-virus software. | Learn the best way to secure your systems with Roger Grimes' Security Advisor website and Security Central newsletter, both from InfoWorld. ]

Exploitation via FireWire

Fecund crypto- and password-cracking seller Passware lately pronounced that it could decode both BitLocker- and TrueCrypt-protected disc volumes utilizing the FireWire procedure. Theoretically, you can carry off related attacks with a DMA-enabled port, including PCI. These attacks may finally achieve success against any software crypto merchandise that will not utilize specialized hardware.

The protection I discussed earlier against cold-boot attacks may be used to defeat FireWire assaults. You may also conquer them by just disabling your FireWire port until needed. I inquired Sumin whether any of Passware's FDE-deciphering products can split right into a non-powered-on pc or whether the 1394 port was disabled. He explained, "No. We've got a brute force assault, but the encryption is quite protected when you have a good-enough password."

Sadly, in case you have PCI, PCMCIA, or connected card slots, somebody may slip in a FireWire adapter card, and it'll function in addition to an enabled FireWire port. I have noticed this strike manner demo, and I was amazed. Turning off all DMA-enabled ports is more challenging to do and may likely significantly change performance (and maybe OS stability), so I'm not certain I advocate it. Nonetheless, you can find protection of a wide range of port-memory strikes and mitigations across multiple programs. Should you-can't keep your powered-on computers physically secure when not being used, keep them run away or in hibernation setting.

Dmitry Sumin, president of Passware, confirmed the the headlines: "I think we can [crack] any of the favorite [software FDE merchandises]. It is a question of moment and creating the crucial-finding criteria."

The FireWire interface can often be enabled or disabled via a computer's BIOS settings or in Device Manager within Microsoft Windows. Most Linux and Unix flavours allow the FireWire port to be handicapped utilizing a boot up control swap, a re-compiled kernel, or a command-line instruction -- although the final option usually will not endure reboots. Most Mac help blogs propose unloading the AppleFWOHCI.kext kernel extension.

One solution to avoid storage assaults isn't to save the decryption key in ordinary memory. The Trusted Platform Module (TPM) chip in the Trustworthy Computing Group is an effort to provide greater safety to crypto secrets utilizing specific equipment. Most business-class computers now come with a TPM chip, and many crypto vendors can benefit from it, including Ms with BitLocker.

Cold-boot attack

In Feb 2008, a-team including Princeton's Dr. Edward Felton -- among the planet premier computer-security investigators -- used an interesting inherent house of pc storage to effectively hack BitLocker [PDF]. It turns out that pc memory chips may hold their contents from a couple of seconds to a few minutes following the computer's power is switched off. Further, decreasing the heat or freezing the processors empowers the items to remain in-play much longer -- enough period to be utilized in yet another specific investigation pc so the information could be copied to permanent storage. The strike team can then search for the primary BitLocker encryption key and unlock the information.

Browser Security Deeply Dive

The "cold boot" assault could very well be the most demanding assault to prevent on a computer without specialized crypto-hardware. The fault lies more with computer storage as opposed to concerned crypto. All applications-based crypto has to ultimately place the decryption key in regular memory in an unprotected state to ensure that it may be used to decrypt the hard disk drive. An opponent always has the choice to discover the unprotected important when he or she has a duplicate of memory to analyze.

This plan requires the opponent to somehow acquire the victim's pc while it's powering-down, just after it's powered down, or when it's coming back up from a suspended or standby condition. Subsequently the assailant has to freeze the processors, transfer them to another specialized computer, and use specially-built applications to get the key for the FDE cipher. If you're worried about this strike, ensure your alone, powered-on computers have good physical security; instead, consider using components crypto solutions that are resistant to cold-boot attacks.

Adjusting cool memory chips is not for the faint at-heart. Within the last two years, other researchers realized they could shoot storage on powered-up computers through the use of the 1394 FireWire interface available on many higher-end notebooks. Here's one discussion describing how exactly to decode BitLocker using the FireWire memory assault [PDF].

More Info it is possible to study:

List of Articles
번호 제목 글쓴이 날짜 조회 수
63186 Смотреть Порно С Красивой Брюнеткой. KyleDement57680567376 2015.10.17 132
63185 Free Hairy Pussy Video - A Simple Trick For Hairy Asian Pussy Revealed CamillaStabile2 2015.10.17 132
63184 While Learning A Language, Get Flight Seats DaleneCanter1942449 2015.10.18 132
63183 Есть ли шанс в настоящее время заработать на криптовалюте – проверенные мнения экспертов ecamog 2021.07.02 132
63182 my site Dzięki temu wziewanie może być w aldonakiel 2021.08.05 132
63181 (스압) 롯데 재벌가 신동학의 파란만장한 인생 건빵폐인 2021.08.26 132
63180 골때녀 저격한 도시어부 탁형선 2022.01.08 132
63179 my site Jeśli mają one służyć jedynie alicjakalmar 2022.01.15 132
63178 Гидра сайт купить esujifu 2022.01.16 132
63177 The Fine Art Of Digital Photography Jillian3956203060906 2015.10.03 131
63176 If you loved this pos... KelvinFavela03891192 2015.10.03 131
63175 If chamberlain gara... AshlyHeaney51821074 2015.10.03 131
63174 Dog Bite Law - Six Things To Do After Your Canine Bites Someone EFQAlexander1313 2015.10.03 131
63173 ประตูม้วน RoseannaDelvalle93 2015.10.03 131
63172 รับถ่ายวีดีโอแต่งงาน MyronPya04302307 2015.10.03 131
63171 . Nissan Tan Chong Electric Motor. RosalinaJessup63298 2015.10.04 131
63170 . Strategy Development, Search Engine Optimization, Resident Search Optimization, Pay Per Click Advertising, Mobile Marketing, Show. CathernGarza6508 2015.10.04 131
63169 Illinois Ticket End AndreaHardey871 2015.10.04 131
63168 ‘Clash Of Clans' Hack ErnestineUssery 2015.10.04 131
63167 ถ่ายวีดีโองานแต่ง MaricelaDhakiyarr2 2015.10.04 131
Board Pagination Prev 1 ... 58 59 60 61 62 63 64 65 66 67 ... 3222 Next
/ 3222
XE1.7.11 Layout1.1.0