- Feb 22, 2007
- 16,240
- 7
- 76
Well, the code is out there now.
Wonder how long it takes people to start making use of it. I don't have anything to hide, but its a heads up for those of you that do .
http://www.hackaday.com/2008/0...attack-tools-released/
Wonder how long it takes people to start making use of it. I don't have anything to hide, but its a heads up for those of you that do .
http://www.hackaday.com/2008/0...attack-tools-released/
The team from Princeton has released their cold boot attack tools. Earlier this year they showed how to recover crypto keys from the memory of a machine that had been powered off. Now they've provided the tools necessary to acquire and play around with your own memory dumps. The bios_memimage tool is written in C and uses PXE to boot the machine and copy the memory. The package also has a disk boot dumper with instructions for how to run it on an iPod. There's also efi_memimage which implements the BSD TCP/IP stack in EFI, but it can be problematic. aeskeyfind can recover 128 and 256bit AES keys from the memory dumps and rsakeyfind does the same for RSA. They've also provided aesfix to correct up to 15% of a key. In testing, they only ever saw 0.1% error in there memory dumps and 0.01% if they cooled the chips first.
