[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAJVRA1QbVO6MndNF5UmCO+3Bw5xqcjEHNEw-aOTAn3VkMLki=w@mail.gmail.com>
Date: Tue, 27 Dec 2011 15:52:50 -0800
From: coderman <coderman@...il.com>
To: "Forristal, Jeff" <jeff.forristal@...el.com>
Cc: "full-disclosure@...ts.grok.org.uk" <full-disclosure@...ts.grok.org.uk>
Subject: Re: Using hardware to attack software
On Fri, Dec 23, 2011 at 2:27 PM, Forristal, Jeff
<jeff.forristal@...el.com> wrote:
> Folks on this list may be interested in a recent whitepaper talking about
> types of attacks that leverage PC hardware to attack local software.
i look forward to the next installment:
"""
'Hardware involved wetware attacks'
Abstract
Password recovery and information disclosure attacks involving
hardware resources are under-represented within the security industry.
With a growing number of attackers moving beyong pure cyber attack
scenarios into blended hardware on flesh methods combined with
automated software strategies to fully realize world class exploit
trees for maximum effect, this hardware involved wetware attack can be
ignored no longer. This paper introduces and details a wide variety
methods from simple brass knuckles or fist packs to elaborate mental
models of exploitation implying pain to the genitals, elaborate set
pieces, and trained performances. we show how this taxonomy of
coercion can be leveraged to extract passwords and obtain information
with great efficiency and efficacy according to a framework we put
forth...
"""
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists