Follow us on Twitter!
Never in the field of human conflict was so much owed by so many to so few. - Winston Churchill
Saturday, July 30, 2016
 Need Help?
Members Online
Total Online: 40
Guests Online: 37
Members Online: 3

Registered Members: 94801
Newest Member: jackal
Latest Articles
View Thread

HellBound Hackers | Computer General | Cryptography


RE: Vista bitlocker cryptanalysis with ramdumps.


Your avatar

Joined: 01.01.70
Posted on 24-02-08 14:59
dex_poet wrote:
Why not have another key for different accounts? Or another key for default/genaric things like the GUI... Also RAM should be pretty empty, they could make a ton of false keys.

Actually, why use Vista? New video games? Have any major companies actually switched to Vista?

All very valid questions. I don't know honestly, but it seems to me like a classic case of stupidity. I mean, apple and linux both have hard disk encryption software, and presumably they did things as you describe. They are still vulnerable to a RAM dump attack after login though.

About filling RAM with false keys, I doubt that would have much effect. How many keys could fit in RAM? I don't know. Even if an attacker had to try 10 000's of possible key stored in RAM, it would be relatively easy.

I don't use vista, but I bet quite a few government organizations do. And the attack isn't vista exclusive, it's just more vulnerable.

Actually, the idea of freezing and dumping RAM is quite interesting to me. I bet you could get a lot of other information that way. Of course, most times physical access is trivial anyway.