[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Full-disclosure] SmartCards programming...
- To: full-disclosure@xxxxxxxxxxxxxxxxx
- Subject: Re: [Full-disclosure] SmartCards programming...
- From: Michael Holstein <michael.holstein@xxxxxxxxxxx>
- Date: Wed, 23 Nov 2005 10:37:56 -0500
I bought 2 Goldcards (one of my teacher advised me to buy a such card to
do what I want... but I think a physical attack can allow someone to
copy the content of the card or the stored key when the authentication
is doing but to begin its perhaps the more simple card I can find ...)
Um .. that's exactly the problem smartcards attempt to address. It's
highly unlikey you'll be able to copy the protected contents without
resorting to a timing attack or the like (and that has been addressed
lately as well).
If you're really patient, you could decapsulate the chip and read the
eeprom contents with a microscope .. but that sort of defeats the
purporse as you've destroyed the original.
As to your other question, a .hex file is just a binary image.
~Mike.
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/