RE: [Full-disclosure] Firewire Attack on Windows Vista

看板Bugtraq作者時間18年前 (2008/03/08 05:18), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串9/10 (看更多)
The main point is to grab encryption keys from memory where the drive is encrypted - but that has to be while the device is on. I mean, it doesn't really matter if you disable password auth when you have physical access as you can just take the drive out, boot from CD, etc... t > -----Original Message----- > From: full-disclosure-bounces@lists.grok.org.uk [mailto:full- > disclosure-bounces@lists.grok.org.uk] On Behalf Of Larry Seltzer > Sent: Friday, March 07, 2008 11:51 AM > To: Bugtraq; Full Disclosure > Subject: Re: [Full-disclosure] Firewire Attack on Windows Vista >=20 > >>Let's say the computer is off. You can turn it on, but that gets you > to a login screen. What can the Firewire device do? >=20 > OK, I guess I misunderstood the original paper > (http://www.sec- > consult.com/fileadmin/Whitepapers/Vista_Physical_Attacks > .pdf). It now looks to me like they are claiming they can disable > password authentication *even while the system is not logged on* - do I > have that right? >=20 > Larry Seltzer > eWEEK.com Security Center Editor > http://security.eweek.com/ > http://blogs.pcmag.com/securitywatch/ > Contributing Editor, PC Magazine > larry.seltzer@ziffdavisenterprise.com >=20 > _______________________________________________ > Full-Disclosure - We believe in it. > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > Hosted and sponsored by Secunia - http://secunia.com/
文章代碼(AID): #17qR4v00 (Bugtraq)
討論串 (同標題文章)
文章代碼(AID): #17qR4v00 (Bugtraq)