Penetration Testing mailing list archives

RE: Questions on GSM Penetration test


From: "Fernando Cardoso" <fernando.cardoso () whatevernet com>
Date: Mon, 28 Jan 2002 09:47:53 -0000

Marc Witteman gave a nice overview on methods to break smart cards security
in the BlackHat Briefings Europe 2001. You can check his presentation on
http://www.blackhat.com/presentations/bh-europe-01/marc-witteman/witteman.pp
t.

Cheers

Fernando

--
Fernando Cardoso - Security Consultant       WhatEverNet Computing, S.A.
Phone : +351 21 7994200                      Praca de Alvalade, 6 - Piso 6
Fax   : +351 21 7994242                      1700-036 Lisboa - Portugal
email : fernando.cardoso () whatevernet com     http://www.whatevernet.com/


What would you mean by "peal off"? Would that be some kind of physical
tampering? Most smart cards often have some kind of "Tamper Resistant
Sealing". Also if you try to peal of the adhesive coating, you will most
probably break the delicate fuse wire which most Smart Card
companies run
in that adhesive coating, thereby making the whole smart-card completely
useless.

"The Netherlands Organisation for Applied Scientific Research"
has the tools
for 'pealing' of the chip layer by layer (thus not the card).
Again I do not
know the exact technology they use but it is not just your ordenary knive
and skrewdriver. More like elektron microscope and the likes. And I do not
think they are the only ones on the planet who can.
In this fase the are not interested in the working of the whole device as
such. They just take the whole thing apart and 'write every thing down'.
Later they reconstruct the device in simulators, like putting it in Orcad,
and then the creative thinking process starts, I guess.



_____________________________________________________________________
                      INTERNET MAIL FOOTER 
A presente mensagem pode conter informação considerada confidencial.
Se o receptor desta mensagem não for o destinatário indicado, fica
expressamente proibido de copiar ou endereçar a mensagem a terceiros.
Em tal situação, o receptor deverá destruir a presente mensagem e por
gentileza informar o emissor de tal facto.
---------------------------------------------------------------------
Privileged or confidential information may be contained in this
message. If you are not the addressee indicated in this message, you
may not copy or deliver this message to anyone. In such case, you
should destroy this message and kindly notify the sender by reply
email.
---------------------------------------------------------------------


----------------------------------------------------------------------------
This list is provided by the SecurityFocus Security Intelligence Alert (SIA)
Service. For more information on SecurityFocus' SIA service which
automatically alerts you to the latest security vulnerabilities please see:
https://alerts.securityfocus.com/


Current thread: