Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Locked thread
Farmer Crack-Ass
Jan 2, 2001

this is me posting irl

BattleMaster posted:

cooling the DRAM ICs reduces the leakage enough that it will last several seconds without refresh so you can quickly swap the RAM stick into another computer without losing data, so when the second computer begins refreshing the data it will maintain whatever was in it

by "another computer" could that also just be a device that's basically a battery and a few DRAM slots?

Adbot
ADBOT LOVES YOU

BattleMaster
Aug 14, 2000

Farmer Crack-rear end posted:

by "another computer" could that also just be a device that's basically a battery and a few DRAM slots?

I've only studied the theory and physics behind DRAM so I don't know

if the RAM modules handle all the refreshing on their own and don't require any input from the PC to do so as long as they are powered, then maybe that would work; it wouldn't be a terribly difficult thing to design either

it's possible refreshing is a function of the system's memory controller though

edit: though I guess it doesn't make a difference if you have a circuit sending the signals to refresh the RAM :unsmigghh:

edit 2: now I'm imagining a device that keeps the RAM alive and also has like a USB interface for downloading the RAM's contents intended specifically for making jacking RAM to be easier

BattleMaster fucked around with this message at 01:56 on Sep 2, 2017

maskenfreiheit
Dec 30, 2004
https://twitter.com/ParkerMolloy/status/903795622763003904

:trumppop:

Grace Baiting
Jul 20, 2012

Audi famam illius;
Cucurrit quaeque
Tetigit destruens.



xposting because god drat

OJ MIST 2 THE DICK
Sep 11, 2008

Anytime I need to see your face I just close my eyes
And I am taken to a place
Where your crystal minds and magenta feelings
Take up shelter in the base of my spine
Sweet like a chica cherry cola

-Cheap Trick

Nap Ghost

Grace Baiting posted:

xposting because god drat

and nothing of value was lost

There Will Be Penalty
May 18, 2002

Makes a great pet!

exploded mummy posted:

and nothing of value was lost

Pile Of Garbage
May 28, 2007



a fool and his butts are soon to be parted

spankmeister
Jun 15, 2008






Farmer Crack-rear end posted:

by "another computer" could that also just be a device that's basically a battery and a few DRAM slots?

No that won't work, ram needs to be actively refreshed i.e. read out then written back. The memory controller takes care of this.

The refresh rate needed to keep ram working is measured in milliseconds.

Volmarias
Dec 31, 2002

EMAIL... THE INTERNET... SEARCH ENGINES...

BattleMaster posted:

intended specifically for making jacking RAM to be easier

Text me

Dylan16807
May 12, 2010

spankmeister posted:

No that won't work, ram needs to be actively refreshed i.e. read out then written back. The memory controller takes care of this.

The refresh rate needed to keep ram working is measured in milliseconds.

most ram chips have self-refresh modes where the memory controller goes idle and you only have to supply power.

if you could nudge the target computer into standby mode, it's likely possible to stuff in some battery wires and pull the ram out without any chips or cooling

Wiggly Wayne DDS
Sep 11, 2010



there's been practical examples pre-ddr4. haven't heard anything lately

redleader
Aug 18, 2005

Engage according to operational parameters
presumably because if you have the physical access to a machine that would allow you to pull that off, then there are much more useful and useful attacks available to you

surebet
Jan 10, 2013

avatar
specialist


so what i'm hearing is "stop burdening local orgs getting computers with added costs of ram purchases", right?

Cocoa Crispies
Jul 20, 2001

Vehicular Manslaughter!

Pillbug

surebet posted:

so what i'm hearing is "stop burdening local orgs getting computers with added costs of ram purchases", right?

I'm also hearing "just trash the FDE key"

surebet
Jan 10, 2013

avatar
specialist


unfortunately drive removal is mandated by audit reqs but i think someone just started trashing ram sticks when they saw gov't surplus auctions with them removed

i don't mind the cargo cult-y stuff when it's harmless but it's costing time on our end to pull sticks and money on the other to replace them, so i'll talk to people

Cocoa Crispies
Jul 20, 2001

Vehicular Manslaughter!

Pillbug

surebet posted:

unfortunately drive removal is mandated by audit reqs but i think someone just started trashing ram sticks when they saw gov't surplus auctions with them removed

i don't mind the cargo cult-y stuff when it's harmless but it's costing time on our end to pull sticks and money on the other to replace them, so i'll talk to people

program that fills ram with just repeated copies of wicked.jpg

fishmech
Jul 16, 2006

by VideoGames
Salad Prong

surebet posted:

so what i'm hearing is "stop burdening local orgs getting computers with added costs of ram purchases", right?

yes, no reason to remove the ram to avoid data leakage. if some auditor is still concerned, running a round of memtest86 would inherently flush anything left on there anyway in the process of testing the ram.

rjmccall
Sep 7, 2007

no worries friend
Fun Shoe

Dylan16807 posted:

most ram chips have self-refresh modes where the memory controller goes idle and you only have to supply power.

even if they didn't it just means that the specialist device would need a chip on it to act like a memory controller. which it would probably want anyway so that you could read the memory without having to risk it by swapping again

haveblue
Aug 15, 2005



Toilet Rascal
I saw someone do the frozen ram trick on a tv show once and I was like "huh cool they did their research"

Jewel
May 2, 2009

cyber terrorists ruining my wings and cheese :sigh:

https://twitter.com/intheInfantry/status/904040173801021440

Shame Boy
Mar 2, 2010


lol


also lol at that twitter account:

quote:

Airborne thinkfluencer. MRE enthusiast.

Workaday Wizard
Oct 23, 2009

by Pragmatica

fallout from notpetya loving up logistics companies?

Maximum Leader
Dec 5, 2014
some idiot got stoned, placed the wrong order and then decided to blame cyberterrorists

Farmer Crack-Ass
Jan 2, 2001

this is me posting irl

SeaborneClink posted:

https://www.nomotion.net/blog/sharknatto/

Who wants to play secfuck bingo?

ssh open to 0.0.0.0/0 & hardcoded super user creds
more hard coded, emtpy, admin creds
GET requests for information chained to cgi exploits

lol goddamn this did not get enough love, holy poo poo


also the goddamn firewall letting you through as long as you know the MAC address:

quote:

5.Firewall bypass no authentication

The most prevalent vulnerability based solely on the high number of affected devices is the firewall bypass that is made possible by the service listening on port 49152. This program takes a three byte magic value “\x2a\xce\x01” followed by the six byte mac address and two byte port of whichever internal host one would like to connect to from anywhere on The Internet! What this basically means is that the only thing protecting an AT&T U-verse internal network device from The Internet is whether or not an attacker knows or is able to brute-force the MAC address of any of its devices! Note however, that the first three bytes (six characters) of a MAC address are very predictable since they correspond to the manufacturer.

...

To make matters worse, this tcp proxy service will alert the attacker when they have found a correct MAC address by returning a different error code to signify that either the host didn’t respond on the specified port or that an RST was returned. Therefore, the attacker is able to attack the MAC address brute-force and the port brute-force problems separately, greatly decreasing the amount of keyspace which must be covered.

The MUMPSorceress
Jan 6, 2012


^SHTPSTS

Gary’s Answer

Farmer Crack-rear end posted:

lol goddamn this did not get enough love, holy poo poo


also the goddamn firewall letting you through as long as you know the MAC address:

This is why I always operate my own devices off of my own router set to dmz and only connect the cable company's devices to their lovely router.

Diva Cupcake
Aug 15, 2005

super poor opsec by @malwaretech
https://twitter.com/briankrebs/status/905021707890688002

Bhodi
Dec 9, 2007

Oh, it's just a cat.
Pillbug
https://twitter.com/MelTajon/status/904058526061830144

Wiggly Wayne DDS
Sep 11, 2010



that's really just muddying the waters and there's at least one logical step in there that doesn't make sense. he attempts to link marcus to a michael chanata and uses this as his sole evidence:



the idea is that like sa quotes just use the username at the time and people can change them later. but there's a backtick at the end there so it's not a direct tie just confirmation he knew about that person. i'm very hesitant on using hackforums posters opinions post-arrest as confirmation for this tie. other than that its the irc server which was known before tied with very low complexity tools that a teenager would write from tutorials

imo it's a pretty half-baked analysis that he couldn't be bothered finishing

sleepwalkers
Dec 7, 2008



i love that google implemented face unlock back in android 4, went 'oh this is stupid af' but not before it made it into multiple releases, eventually removed it (i think), but of course sarnsung is like "YEAH BUT OPTIONS" and leaves that in even after including iris scanning.

Shame Boy
Mar 2, 2010

sleepwalkers posted:

i love that google implemented face unlock back in android 4, went 'oh this is stupid af' but not before it made it into multiple releases, eventually removed it (i think), but of course sarnsung is like "YEAH BUT OPTIONS" and leaves that in even after including iris scanning.

Phones can do iris scans now? When did this happen?

Volmarias
Dec 31, 2002

EMAIL... THE INTERNET... SEARCH ENGINES...

sleepwalkers posted:

i love that google implemented face unlock back in android 4, went 'oh this is stupid af' but not before it made it into multiple releases, eventually removed it (i think), but of course sarnsung is like "YEAH BUT OPTIONS" and leaves that in even after including iris scanning.

It sells phones, that's the only thing that matters to them. Security is an afterthought if it's thought of at all.

BangersInMyKnickers
Nov 3, 2004

I have a thing for courageous dongles

lol so no IR sensing for face unlock, no second camera for 3d detection. sarnsung'd again

sleepwalkers
Dec 7, 2008


ate all the Oreos posted:

Phones can do iris scans now? When did this happen?

the s8 has the capability, it has some ir camera or something. im an idiot so i dont really know how that all works but surprise its also extremely easy to fool

BangersInMyKnickers posted:

lol so no IR sensing for face unlock, no second camera for 3d detection. sarnsung'd again

it has an ir camera but sarnsung somehow allows you to opt to use the regular-rear end camera for dumb face unlock instead...

spankmeister
Jun 15, 2008







Lol I did this trick 10 years ago when anroid was just at 1.5 or 2.3 possibly.

Nice to know sarbsung made zero progress in the past 10 years

wolrah
May 8, 2006
what?

Volmarias posted:

It sells phones, that's the only thing that matters to them. Security is an afterthought if it's thought of at all.

This one's always struck me as a matter of what threats you're trying to secure against.

If you're trying to stop someone who wants to break in to your phone specifically, yeah any of the one-camera facial recognition systems are pretty much junk.

If you're trying to stop some random who found/stole your phone from being able to get in to your poo poo, they're pretty effective.

Bhodi
Dec 9, 2007

Oh, it's just a cat.
Pillbug
that would be true except everyone has a public headshot on Facebook or LinkedIn and you can receive calls and texts while locked

M_Gargantua
Oct 16, 2006

STOMP'N ON INTO THE POWERLINES

Exciting Lemon

wolrah posted:

If you're trying to stop some random who found/stole your phone from being able to get in to your poo poo, they're pretty effective.

but that's why we have pin passcodes

Volmarias
Dec 31, 2002

EMAIL... THE INTERNET... SEARCH ENGINES...
I'm a bad person because I use the fingerprint sensor to unlock my phone, and that's still more secure than "here's a picture of my head meats"

apseudonym
Feb 25, 2011

wolrah posted:

This one's always struck me as a matter of what threats you're trying to secure against.

If you're trying to stop someone who wants to break in to your phone specifically, yeah any of the one-camera facial recognition systems are pretty much junk.

If you're trying to stop some random who found/stole your phone from being able to get in to your poo poo, they're pretty effective.

The point of a lockscreen is the first.

Adbot
ADBOT LOVES YOU

maskenfreiheit
Dec 30, 2004

Volmarias posted:

I'm a bad person because I use the fingerprint sensor to unlock my phone, and that's still more secure than "here's a picture of my head meats"

I use a long (8+) char string I memorized, because I have to uphold my reputation as the most paranoid YOSPOSter.

As a bonus, it's a pain to constantly unlock my phone so I tend to dick around with it less

  • Locked thread