Create an Account
username: password:
 
  MemeStreams Logo

MemeStreams Discussion

search


This page contains all of the posts and discussion on MemeStreams referencing the following web page: Way to use that M in DMA!. You can find discussions on MemeStreams as you surf the web, even if you aren't a MemeStreams member, using the Threads Bookmarklet.

Way to use that M in DMA!
by Acidus at 3:17 pm EST, Mar 4, 2008

To use the tool, hackers must connect a Linux-based computer to a Firewire port on the target machine. The machine is then tricked into allowing the attacking computer to have read and write access to its memory.

With full access to the memory, the tool can then modify Windows' password protection code, which is stored there, and render it ineffective.

[sigh]. DMA as a malicious vector has been understood for some time now. I point you to the 4 year old presentation 0wned by an iPod.

Thus I'm not super impressed by a tool someone wrote in 2006 and sat on for 2 years that unlocks a windows PC over Firewire. Disabling a password is silly when the same vector also grants you the ability to inject malicious code directly into a process.


 
 
Powered By Industrial Memetics