View previous topic :: View next topic |
Author |
Message |
acruxksa Doh!
Joined: 17 Oct 2003 Posts: 1051 Location: The Cradle of Storms
|
Posted: Thu, 21 Feb 2008 21:00:10 Post Subject: Is nothing safe in this world? |
|
|
I saw a link to this on Engadget. Watch the video, it's crazy what people can think up these days. I guess it still requires physical access, but you won't find me using sleep mode again.
http://citp.princeton.edu/memory/ _________________
|
|
Back to top |
|
|
Little Bruin
Boo Boo
Joined: 07 Apr 2003
Posts: 667
Location: Pic-A-Nic Basket |
|
|
BeerCheeze *hick*
Joined: 14 Jun 2003 Posts: 9285 Location: At the Bar
|
|
Back to top |
|
|
acruxksa Doh!
Joined: 17 Oct 2003 Posts: 1051 Location: The Cradle of Storms
|
Posted: Fri, 22 Feb 2008 01:57:47 Post Subject: |
|
|
I found the fact that they were recovering data from ram fully 10minutes after powering the system off and removing the module to be quite interesting. I knew on some level that ram retained information for a small amount of time, but I always thought it was milliseconds, not minutes and seconds. Or worse 10 minutes with cooling.
This hack would be ideal for computers (laptops that are in sleep mode).
Cheezy, does your method also include bios boot passwords? _________________
|
|
Back to top |
|
|
BeerCheeze *hick*
Joined: 14 Jun 2003 Posts: 9285 Location: At the Bar
|
Posted: Fri, 22 Feb 2008 10:37:53 Post Subject: |
|
|
acruxksa wrote: | I found the fact that they were recovering data from ram fully 10minutes after powering the system off and removing the module to be quite interesting. I knew on some level that ram retained information for a small amount of time, but I always thought it was milliseconds, not minutes and seconds. Or worse 10 minutes with cooling.
This hack would be ideal for computers (laptops that are in sleep mode).
Cheezy, does your method also include bios boot passwords? |
I new it stayed in memory, however I didn't know it was that long.
No, this method doesn't get around BIOS boot passwords. However if the password is on the BIOS and not on the HDD then it still can be easily bypassed by opening the system and changing a jumper.
However, while it's maybe detectable if you have physical access and an hour or so (depends on size of the HDD) you can make a bit-by-bit copy of the HDD and then use many tools to look at the data on the HDD.
I think the key to the hack these people demonstrated is that you need to shut down your laptop when either it's not going to be in your site, or when traveling with it. This way you give enough time for the memory to discharge. |
|
Back to top |
|
|
|