[Full-disclosure] Firewire Attack on Windows Vista
Thor (Hammer of God)
thor at hammerofgod.com
Fri Mar 7 19:55:19 GMT 2008
The main point is to grab encryption keys from memory where the drive is
encrypted - but that has to be while the device is on. I mean, it
doesn't really matter if you disable password auth when you have
physical access as you can just take the drive out, boot from CD, etc...
> -----Original Message-----
> From: full-disclosure-bounces at lists.grok.org.uk [mailto:full-
> disclosure-bounces at lists.grok.org.uk] On Behalf Of Larry Seltzer
> Sent: Friday, March 07, 2008 11:51 AM
> To: Bugtraq; Full Disclosure
> Subject: Re: [Full-disclosure] Firewire Attack on Windows Vista
> >>Let's say the computer is off. You can turn it on, but that gets you
> to a login screen. What can the Firewire device do?
> OK, I guess I misunderstood the original paper
> .pdf). It now looks to me like they are claiming they can disable
> password authentication *even while the system is not logged on* - do
> have that right?
> Larry Seltzer
> eWEEK.com Security Center Editor
> Contributing Editor, PC Magazine
> larry.seltzer at ziffdavisenterprise.com
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
Full-Disclosure is hosted and sponsored by Secunia.