Hacker News new | past | comments | ask | show | jobs | submit login
A closer look into the RSA SecureID software token (sensepost.com)
46 points by wglb on May 19, 2012 | hide | past | favorite | 2 comments



If you've got a rootkit on the machine, an easier way is to simply read out of memory? I presume the key would be in the clear, in memory at some stage.


Lsadump, a tool they mention in the article, does just that for the Windows machine key. The other token input data is protected with that key.

Reading a single token code out of memory from the soft token process while running would certainly work if the targets computer was on and the soft token was in use, but having a completely independent cloned instance gives the attacker a lot more flexibility when impersonating the user.




Consider applying for YC's W25 batch! Applications are open till Nov 12.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: