Re: [Full-disclosure] Brilliant attack "bypasses" bitlocker

2009-12-12 Thread bugtraq
> > http://www.theregister.co.uk/2009/12/05/windows_bitlocker_attacks/
> 
> Research grant ideas for 2010:
> 
> 1) Replacing not only the computer, but victim's entire apartment,
> with cardboard cutouts to intercept passwords,

You know your continued innovation continues to inspire and amaze us. In order 
to ensure you're
properly credited everytime this attack is conducted/referenced, I propose that 
we should call this 
Zalewski Complex Jacking. 

I could totally see DARPA funding this :)

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Brilliant attack "bypasses" bitlocker

2009-12-11 Thread yaroslav
I couldn't imagine a method more reliable than thermorectal
cryptoanalysis, but you have done it with number 3). however, there is
a weak point:  if, during the process of universe destruction, an
attacker are under constant observation by someone, his psi-function
might eventually collapse somewhere he really don't want to be...


>> http://www.theregister.co.uk/2009/12/05/windows_bitlocker_attacks/
>
> Research grant ideas for 2010:
>
> 1) Replacing not only the computer, but victim's entire apartment,
> with cardboard cutouts to intercept passwords,
>
> 2) Substituting victim's spouse with a conspicuously German lookalike,
>
> 3) Destroying all quantum-superposed universes in which the password
> is *not* known to the attacker, in order to emerge in one where it is.
>
> 4) ???
>
> 5) Profit.
>
> /mz
>
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Brilliant attack "bypasses" bitlocker

2009-12-11 Thread Michal Zalewski
> http://www.theregister.co.uk/2009/12/05/windows_bitlocker_attacks/

Research grant ideas for 2010:

1) Replacing not only the computer, but victim's entire apartment,
with cardboard cutouts to intercept passwords,

2) Substituting victim's spouse with a conspicuously German lookalike,

3) Destroying all quantum-superposed universes in which the password
is *not* known to the attacker, in order to emerge in one where it is.

4) ???

5) Profit.

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Brilliant attack "bypasses" bitlocker

2009-12-11 Thread Thor (Hammer of God)
/me sheepishly acquiesces to Dan publically.

Dan is right, I am wrong.  After consulting our resident grammar expert, I have 
been corrected.  My apologies to Dan for incorrectly attributing a grammatical 
error to his piece.  I was going to bet on it too ;)

t

-Original Message-
From: Dan Goodin [mailto:dgoo...@sitpub.com] 
Sent: Friday, December 11, 2009 2:21 PM
To: Thor (Hammer of God)
Subject: Re: Brilliant attack "bypasses" bitlocker

"Methods" is an object in the sentence. I think what's confusing you is
that it comes ahead of the subject, which is "attack."

Thor (Hammer of God) wrote:
> Sorry, you're wrong on this one.  Only if your structure was "The 
> hardware-level phishing attack" as the object and not "methods" would you be 
> correct.  But it's not  The methods "are," not the methods "is."  You 
> might have intended that to be the case, but you didn't write it like that.
> 
> t

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Brilliant attack "bypasses" bitlocker

2009-12-11 Thread Thor (Hammer of God)
P.S. - while poking fun at "is" rather than "are," I did not mean for my 
statements to suggest that Dan had qualified the nature of this "attack" as 
"brilliant."  That was my own language making fun of the attack, and not 
suggesting that Dan or el Reg was somehow making such a comment.

The other attacks not mentioned may very well be l33t, but I found the 
aforementioned attack funny.  Just wanted to make that clear.

T


From: full-disclosure-boun...@lists.grok.org.uk 
[mailto:full-disclosure-boun...@lists.grok.org.uk] On Behalf Of Thor (Hammer of 
God)
Sent: Friday, December 11, 2009 1:29 PM
To: full-disclosure@lists.grok.org.uk
Subject: [Full-disclosure] Brilliant attack "bypasses" bitlocker

http://www.theregister.co.uk/2009/12/05/windows_bitlocker_attacks/

This "method" is almost as bad as Dan's grammar ;)

"Among the methods discussed is what they call a "hardware-level phishing 
attack," in which a target machine is replaced with a counterfeit one that 
provides precisely the same messages and prompts that the original machine 
would have produced. The imposter machine captures user input and relays it to 
the attacker, who then uses it on the real machine."

I love the old, "replace the computer with an exact duplicate while they are 
not looking and get them to type in their passphrase" trick.   Certificates 
anyone?

t
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/