Full Disclosure mailing list archives
Re: Using hardware to attack software
From: Valdis.Kletnieks () vt edu
Date: Tue, 27 Dec 2011 19:20:14 -0500
On Tue, 27 Dec 2011 15:52:50 PST, coderman said:
Password recovery and information disclosure attacks involving hardware resources are under-represented within the security industry. With a growing number of attackers moving beyong pure cyber attack scenarios into blended hardware on flesh methods combined with automated software strategies to fully realize world class exploit trees for maximum effect, this hardware involved wetware attack can be ignored no longer. This paper introduces and details a wide variety methods from simple brass knuckles or fist packs to elaborate mental models of exploitation implying pain to the genitals, elaborate set pieces, and trained performances. we show how this taxonomy of coercion can be leveraged to extract passwords and obtain information with great efficiency and efficacy according to a framework we put forth...
I just won enough on Buzzword Bingo to retire. :)
Attachment:
_bin
Description:
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- Using hardware to attack software Forristal, Jeff (Dec 24)
- Re: Using hardware to attack software Gage Bystrom (Dec 24)
- Re: Using hardware to attack software Forristal, Jeff (Dec 29)
- Re: Using hardware to attack software Gage Bystrom (Dec 27)
- Re: Using hardware to attack software coderman (Dec 27)
- Re: Using hardware to attack software Forristal, Jeff (Dec 29)
- Re: Using hardware to attack software Gage Bystrom (Dec 24)
- Re: Using hardware to attack software coderman (Dec 27)
- Re: Using hardware to attack software Valdis . Kletnieks (Dec 27)