|
Full Disclosure
mailing list archives
Windows 7 Firewire Attacks - and Defense Techniques
From: Security Research Publications <publications () securityresearch at>
Date: Thu, 13 Aug 2009 14:11:58 +0200
Hello,
In the course of the Windows 7 RTM release, the Security Research Lab would like to share some results on firewire/DMA
based hacks and Windows 7, which is susceptible to such attacks.
While the attack vector itself is already known from previous Windows versions, we also describe the impact of
Firewire-based Windows authentication bypassing on Microsoft's full-disk encryption solution BitLocker, the Encrypted
File System (EFS) and Windows domains. A comprehensive section on countermeasures on different layers concludes this
whitepaper, which can be downloaded from:
http://www.securityresearch.at/publications/windows7_firewire_physical_attacks.pdf
Moreover, we have developed a software solution to protect against Firewire-based physical security attacks on Windows
systems which is discussed in a separate whitepaper:
http://www.securityresearch.at/publications/windows_firewire_blocker.pdf
The software can be downloaded here - use at your own risk:
http://www.securityresearch.at/publications/firewireblocker.zip
Kind regards,
Benjamin
--
Dipl.-Ing. Mag. Mag. Benjamin Böck
IS Services & Audit
Security Research Sicherheitsforschung GmbH
Office: Sommerpalais Harrach / Favoritenstr. 16 / 1040 Wien
M: bboeck () securityresearch at
T: +43 699 14444929
F: +43 1 505 8888
http://www.securityresearch.at
Identifizierung gemäß § 14 UGB:
Firmenname: Security Research Sicherheitsforschung GmbH
Firmensitz: Favoritenstraße 16 / 1040 Wien
Firmenbuchnummer: FN271386 y
Firmenbuchgericht: Handelsgericht Wien
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
By Date
By Thread
Current thread:
- Windows 7 Firewire Attacks - and Defense Techniques Security Research Publications (Aug 13)
|