One option would be to debug via a FW port. Another option would be to trick the user into installing this software, or trick the user into somehow giving away access to the machine (aka these APTs we keep hearing about) and layering this on top.
Cheers Ken -----Original Message----- From: David Lum [mailto:david....@nwea.org] Sent: Saturday, 22 December 2012 7:39 AM To: NT System Admin Issues Subject: RE: Disk encryption killer: Anyone see this? So I'm hearing we shouldn't be concerned about a PGP-encrypted laptop *unless* it's hibernation file is unencrypted (read, no full disk encryption)? A fully encrypted disk that has a screen saver password is going to be pretty secure? "You'll thus need to get a memory dump from a running PC (locked or unlocked) with encrypted volumes mounted, via a standard forensic product or via a FireWire attack.." >> Ok how easy is it to get a memory dump from a running PC? "Alternatively, decryption keys can also be derived from hibernation files if a target PC is turned off" >> If the hiberfil.sys is encrypted, how do they get to it? Dave -----Original Message----- From: Steve Kradel [mailto:skra...@zetetic.net] Sent: Friday, December 21, 2012 10:59 AM To: NT System Admin Issues Subject: Re: Disk encryption killer: Anyone see this? I don't find this alarming at all: it requires access to the key data, and is useful if you have a memory dump or a cleartext hibernation file (hiberfil.sys is going to be *encrypted* on a hibernating machine with whole-disk encryption). This tool appears to be a good time-saver, given a memory dump, because it knows where to look in for the keys and how to extract them, but it does not attack any inherent cryptographic weakness or key management problems in PGP, TC, etc.. --Steve On Fri, Dec 21, 2012 at 1:34 PM, Matthew W. Ross <mr...@ephrataschools.org> wrote: > I'm no security expert. > > But I do assume that if the physical machine is compromised, then the data it > holds is as good as compromised as well, no matter what level of encryption > you have. > > > --Matt Ross > Ephrata School District > > > ----- Original Message ----- > From: Ziots, Edward > [mailto:ezi...@lifespan.org] > To: NT System Admin Issues > [mailto:ntsysadmin@lyris.sunbelt-software.com] > Sent: Fri, 21 Dec 2012 > 09:57:51 -0800 > Subject: RE: Disk encryption killer: Anyone see this? > > >> I would say off the record no, if you used popular encryption >> software and a repeatable process, but when you lose physical >> security of an asset, given a reasonable amount of time and effort >> the encryption will be cracked and data will be obtained. >> >> >> >> Z >> >> >> >> Edward E. Ziots, CISSP, Security +, Network + >> >> Security Engineer >> >> Lifespan Organization >> >> ezi...@lifespan.org >> >> >> >> From: Chinnery, Paul [mailto:pa...@mmcwm.com] >> Sent: Friday, December 21, 2012 12:37 PM >> To: NT System Admin Issues >> Subject: RE: Disk encryption killer: Anyone see this? >> >> >> >> Oh, great. I wonder what view CMS will take if a laptop is >> stolen\lost and it's encrypted. Will they still say it's a HIPAA violation? >> >> >> >> From: David Lum [mailto:david....@nwea.org] >> Sent: Friday, December 21, 2012 12:29 PM >> To: NT System Admin Issues >> Subject: Disk encryption killer: Anyone see this? >> >> >> >> Comments anyone? Looks like bad news... >> >> http://thenextweb.com/insider/2012/12/20/this-299-tool-is-reportedly- >> cap able-of-cracking-bitlocker-pgp-and-truecrypt-disks-in-real-time/ >> >> >> >> David Lum >> Sr. Systems Engineer // NWEATM >> Office 503.548.5229 // Cell (voice/text) 503.267.9764 >> >> >> >> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ >> <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ >> >> --- >> To manage subscriptions click here: >> http://lyris.sunbelt-software.com/read/my_forums/ >> or send an email to listmana...@lyris.sunbeltsoftware.com >> with the body: unsubscribe ntsysadmin >> >> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ >> <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ >> >> --- >> To manage subscriptions click here: >> http://lyris.sunbelt-software.com/read/my_forums/ >> or send an email to listmana...@lyris.sunbeltsoftware.com >> with the body: unsubscribe ntsysadmin >> >> >> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ >> <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ >> >> --- >> To manage subscriptions click here: >> http://lyris.sunbelt-software.com/read/my_forums/ >> or send an email to listmana...@lyris.sunbeltsoftware.com >> with the body: unsubscribe ntsysadmin > > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ > <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ > > --- > To manage subscriptions click here: > http://lyris.sunbelt-software.com/read/my_forums/ > or send an email to listmana...@lyris.sunbeltsoftware.com > with the body: unsubscribe ntsysadmin > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin