Security Basics mailing list archives
RES: Flash Memory Wiping
From: "Cleverson de Freitas Ferla" <ferla () aliasnet com br>
Date: Mon, 29 Jan 2007 16:15:28 -0300
-----Mensagem original----- De: listbounce () securityfocus com [mailto:listbounce () securityfocus com] Em nome de William M. Ryan Enviada em: sexta-feira, 26 de janeiro de 2007 12:19 Para: security-basics () securityfocus com Assunto: Re: Flash Memory Wiping Since I started this thread I have tried several of the wiping solutions that were recommended, but kept coming up on one problem. The user accessible flash on the PDAs (iPaq File Store) is not mountable as a drive letter by any technique I know or could find. I could not find a tool that would let me mount it either. None of the Wiping programs could find it so they could not wipe it. I finally spend a day determining the size of the iPaq File Store (to the byte) and writing scripts to create three files (File 1 all low order blanks (chr(0)), File 2 (all high order blanks (Chr(255)) and file 3 random characters (chr(int(rnd()*255)))) Each file was written to the file store in order. The last file was left in place. My department feels this suffices for wiping the PDA. Anyone have any other ideas for when this happens in the future? "Lou Losee" <llosee () gmail com > To Sent by: security-basics () securityfocus com listbounce@securi cc tyfocus.com Subject Re: Flash Memory Wiping 01/24/2007 01:16 PM For some good discussions on the implications of writing to flash and how the wear-leveling algorithms incorporated by them get in the way of erasure and overwriting, I would recommend the following links: http://forums.truecrypt.org/viewtopic.php?t=1702 http://bbs.heidi.ie/viewtopic.php?t=1568&sid=60ea6000a914dced82196c64783feac c Lou Losee atsec information security corp. On 1/23/07, Dragos Ruiu <dr () eusecwest com> wrote:
On Monday 22 January 2007 12:55, C Anctil wrote:I would encrypt the the files before deleting them. If they ever get recovered, they would at least be encrypted. I would use something like truecrypt.This also would not work so well on flash, as you would likely wind up with encrypted and unecrypted versions sitting on the flash
simultaneously.
Overwriting works oddly with flash... cheers, --dr -- World Security Pros. Cutting Edge Training, Tools, and Techniques London, U.K. Mar 1-2 - 2007 http://eusecwest.com pgpkey http://dragos.com/ kyxpgp
-- Artificial Intelligence is no match for Natural Stupidity
Attachment:
smime.p7s
Description:
Current thread:
- Flash Memory Wiping William M. Ryan (Jan 18)
- Re: Flash Memory Wiping Joel Dinel (Jan 19)
- RE: Flash Memory Wiping Laundrup, Jens (Jan 19)
- Re: Flash Memory Wiping Deian Stefan (Jan 22)
- Re: Flash Memory Wiping Dragos Ruiu (Jan 23)
- Re: Flash Memory Wiping Atom Smasher (Jan 22)
- Re: Flash Memory Wiping C Anctil (Jan 23)
- Re: Flash Memory Wiping Dragos Ruiu (Jan 24)
- Re: Flash Memory Wiping Lou Losee (Jan 24)
- Re: Flash Memory Wiping William M. Ryan (Jan 26)
- RES: Flash Memory Wiping Cleverson de Freitas Ferla (Jan 30)
- Re: Flash Memory Wiping C Anctil (Jan 23)
- Re: Flash Memory Wiping Snoopy Brown (Jan 24)
- <Possible follow-ups>
- Re: Flash Memory Wiping kenneth . buckler (Jan 19)
- Re: Flash Memory Wiping chandlg (Jan 19)
- Re: Flash Memory Wiping Atom Smasher (Jan 22)
- Re: Flash Memory Wiping nolife (Jan 19)
- Re: Flash Memory Wiping Dragos Ruiu (Jan 22)
- Re: Flash Memory Wiping mullinsw (Jan 19)
- How to securing endpoints? WALI (Jan 22)
- Re: Flash Memory Wiping bbell_97 (Jan 19)
- RE: Flash Memory Wiping Barrett, Will (Jan 22)