Follow us on Twitter!
Become the change you seek in the world. - Gandhi
Friday, April 18, 2014
Navigation
Home
HellBoundHackers Main:
HellBoundHackers Find:
HellBoundHackers Information:
Learn
Communicate
Submit
Shop
Challenges
HellBoundHackers Exploit:
HellBoundHackers Programming:
HellBoundHackers Think:
HellBoundHackers Track:
HellBoundHackers Patch:
HellBoundHackers Other:
HellBoundHackers Need Help?
Other
Members Online
Total Online: 17
Guests Online: 15
Members Online: 2

Registered Members: 82822
Newest Member: TheBunter
Latest Articles
View Thread

HellBound Hackers | Computer General | Cryptography

Author

RE: Vista bitlocker cryptanalysis with ramdumps.


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 24-02-08 14:59
dex_poet wrote:
Why not have another key for different accounts? Or another key for default/genaric things like the GUI... Also RAM should be pretty empty, they could make a ton of false keys.

Actually, why use Vista? New video games? Have any major companies actually switched to Vista?


All very valid questions. I don't know honestly, but it seems to me like a classic case of stupidity. I mean, apple and linux both have hard disk encryption software, and presumably they did things as you describe. They are still vulnerable to a RAM dump attack after login though.


About filling RAM with false keys, I doubt that would have much effect. How many keys could fit in RAM? I don't know. Even if an attacker had to try 10 000's of possible key stored in RAM, it would be relatively easy.

I don't use vista, but I bet quite a few government organizations do. And the attack isn't vista exclusive, it's just more vulnerable.

Actually, the idea of freezing and dumping RAM is quite interesting to me. I bet you could get a lot of other information that way. Of course, most times physical access is trivial anyway.