fbpx

The ultimate in brute-force attacks…

http://arstechnica.com/security/2015/03/cutting-edge-hack-gives-super-user-status-by-exploiting-dram-weakness/

 

This here.  This is a bit of out-of-the-box thinking that I admire.  Just a little bit.

The way this attack works is via a hardware hack, see, in this particular class of DIMMS the chips are very close together.  So close together that accessing one repeatedly in just the right place can jump the gap to the next and make a change over there.

It’s the bit-level equivalent of using a double-boiler.  You heat the water on the outside and the transference affects the chocolate on the inside.  (Okay, clumsy metaphor but mmmmmmmm…. chocolate).

At this current stage, it’s probably best used for simply f*cking up the other person’s computer (rather than a full-blown hack), but still, as a thought process, it’s very old-school, using the properties of the hardware itself, rather than trying to get in through the software.

Website Pin Facebook Twitter Myspace Friendfeed Technorati del.icio.us Digg Google StumbleUpon Premium Responsive

Comments are closed.