On Tue, 27 Dec 2011 15:52:50 PST, coderman said: > Password recovery and information disclosure attacks involving > hardware resources are under-represented within the security industry. > With a growing number of attackers moving beyong pure cyber attack > scenarios into blended hardware on flesh methods combined with > automated software strategies to fully realize world class exploit > trees for maximum effect, this hardware involved wetware attack can be > ignored no longer. This paper introduces and details a wide variety > methods from simple brass knuckles or fist packs to elaborate mental > models of exploitation implying pain to the genitals, elaborate set > pieces, and trained performances. we show how this taxonomy of > coercion can be leveraged to extract passwords and obtain information > with great efficiency and efficacy according to a framework we put > forth... I just won enough on Buzzword Bingo to retire. :)
Attachment:
pgpRCTR55dveU.pgp
Description: PGP signature
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/