Learn, hack!

Hacking and security documentation: slides, papers, video and audio recordings. All in high-quality, daily updated, avoiding security crap documents. Spreading hacking knowledge, for free, enjoy. Follow on .

Cryptographic key recovery from Linux memory dumps

Type
Slides
Tags
cryptography, forensic
Authors
Torbjörn Pettersson
Event
Chaos Communication Camp 2007
Indexed on
Mar 27, 2013
URL
http://events.ccc.de/camp/2007/Fahrplan/attachments/1312-Cryptokey_Forensics_slides.ppt
File name
1312-Cryptokey_Forensics_slides.ppt
File size
249.5 KB
MD5
11cfaf640dcf947808a48f589ba69f8f
SHA1
358fe9615b66b67a0f810d09e8c82aad9fdee3b7

Cryptoloop and dm-crypt are the two disk encryption solutions provided by the stock Linux kernel. This lecture will describe in detail how to find and reuse cryptoloop and dm-crypt keys from kernel memory. When disk encryption is done right it is virtually impossible to break, but as with any security function it is never stronger than its weakest link. Out of necessity keys needs to be stored in cleartext in memory during usage and can be collected by anyone with access to a memory dump of the system. This presentation will go into the details of how cryptographic keys used by dm-crypt and cryptoloop are stored and used in the Linux 2.6 kernel-series and how they can be recovered and reused.

About us

Secdocs is a project aimed to index high-quality IT security and hacking documents. These are fetched from multiple data sources: events, conferences and generally from interwebs.

Statistics

Serving 8166 documents and 531.0 GB of hacking knowledge, indexed from 2419 authors from 163 security conferences.

Contribute

To support this site and keep it alive, you can click on the buttons below. Any help is really appreciated! This service is provided for free, but real money is needed to pay bills.

Flattr this Click here to lend your support to: Keep live SecDocs for an year and make a donation at www.pledgie.com !