[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Full-disclosure] Brilliant attack "bypasses" bitlocker
- To: "Thor (Hammer of God)" <thor@xxxxxxxxxxxxxxx>, "full-disclosure@xxxxxxxxxxxxxxxxx" <full-disclosure@xxxxxxxxxxxxxxxxx>
- Subject: Re: [Full-disclosure] Brilliant attack "bypasses" bitlocker
- From: "Thor (Hammer of God)" <thor@xxxxxxxxxxxxxxx>
- Date: Fri, 11 Dec 2009 14:00:53 -0800
P.S. - while poking fun at "is" rather than "are," I did not mean for my
statements to suggest that Dan had qualified the nature of this "attack" as
"brilliant." That was my own language making fun of the attack, and not
suggesting that Dan or el Reg was somehow making such a comment.
The other attacks not mentioned may very well be l33t, but I found the
aforementioned attack funny. Just wanted to make that clear.
T
From: full-disclosure-bounces@xxxxxxxxxxxxxxxxx
[mailto:full-disclosure-bounces@xxxxxxxxxxxxxxxxx] On Behalf Of Thor (Hammer of
God)
Sent: Friday, December 11, 2009 1:29 PM
To: full-disclosure@xxxxxxxxxxxxxxxxx
Subject: [Full-disclosure] Brilliant attack "bypasses" bitlocker
http://www.theregister.co.uk/2009/12/05/windows_bitlocker_attacks/
This "method" is almost as bad as Dan's grammar ;)
"Among the methods discussed is what they call a "hardware-level phishing
attack," in which a target machine is replaced with a counterfeit one that
provides precisely the same messages and prompts that the original machine
would have produced. The imposter machine captures user input and relays it to
the attacker, who then uses it on the real machine."
I love the old, "replace the computer with an exact duplicate while they are
not looking and get them to type in their passphrase" trick. Certificates
anyone?
t
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/