期刊文献+

渗透攻击技术研究 被引量:3

Attack technology penetration
原文传递
导出
摘要 计算机中存在一个单独的区块:活动内存,任何一个攻击者都愿意把手伸到这个存储有敏感信息完全未加密的区块。系统为了方便调用,在内存中存储了多种有价值信息;全盘加密机制也必须在内存的某个地方存储密钥。同样,Wi-fi密钥也是如此存储的。Windows在内存中存有注册表键值,系统和SAM hive。许多剪贴板内容和应用程序密码也在存储于内存中。即问题在于,内存存储了系统在某时刻需要的大量有价值信息。攻击者要获得它,需要使用一些同样的取证技术。本文有助于向渗透测试工具包中增加这些技术。 there is a single block computer: memory, any attacker would reachthe store sensitive information completely une ncryptedblock.System for the convenience of the call, stored in the memory of a variety of valuable information; full disk enc ryption mechanism must be somewhere in the storage key memory.Similarly, the Wi-fi key is stored.In memory Windows entityr egistry key, and SAM hive.Many of the contents of the clipboard andapplication code is stored in the memory.The problem is, memory storagesystem need at some point and a lot of valuable information.The attacker to obtain it, need to use some of the s ame forensics technology.This paperhelps to increase the penetration test kit.
作者 陆庆华
出处 《网络安全技术与应用》 2014年第3期18-18,20,共2页 Network Security Technology & Application
关键词 渗透攻击 冷启动攻击 火线接口攻击 penetration attack cold boot attack FireWire attack
  • 相关文献

参考文献1

同被引文献55

  • 1胡忠望,刘卫东.Cookie应用与个人信息安全研究[J].计算机应用与软件,2007,24(3):50-53. 被引量:38
  • 2吴海燕,蒋东兴,程志锐,高国柱.入侵防御系统研究[J].计算机工程与设计,2007,28(24):5844-5846. 被引量:18
  • 3Halderman J A,Schoen S D,Heninger N,et al. Lest we remember :cold-boot attacks on encryption keys [ J]. Communication of theACM, 2009,52(5) :91-98.
  • 4Smart phone thefts rise Henyu [ R/OL]. (2014-03-28). http://www. consumerreports. org/ cro/ news/2014/04/smart-phone-thefts-rose-to- 3-1 -million-last-year/index. htm.
  • 5翟方庆.极限破解:利用低温环境读取Android加密数据[EB/0L]. ( 2013-02-19 ) . http://www. csdn. net/article/1970- 01 - 01/2814179.
  • 6成明遥.渗透测试中的冷却启动攻击和其他取证技术[EB/OL].(2014- 01- 11 ). http://blog. idf. cn/2014/01 /using-cold-boot-at-tacks-and-other-forensic-techniques-in-penetration-tests/.
  • 7Scheick L Z,Guertin S M,Swift G M. Analysis of radiation effects onindividual DRAM cells [ J ]. IEEE Trans on Nuclear Science,2000,47(6): 2534-2538.
  • 8Gutmann P. Data remanence in semiconductor devices [ C ] //Proc ofthe 10th USENIX Security Symposium. 2001:1-19.
  • 9Gruhn M, Mtiller T. On the practicability of cold boot attacks[ C]//Proc of the 8th International Conference on Availability, Reliabilityand Security. 2013 ; 390-397.
  • 10Link W, May H. Eigenschaften von MOS-Ein-Transistorspeicherzellenbei tiefen Temperaturen [ J ]. Archivfur Elektronik Ubertragung-stechnik, 1979,33: 229-235.

引证文献3

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部