Camp 2007 - 1.01

Chaos Communication Camp 2007
To infinity and beyond

Torbjörn Pettersson
Day 2
Room Shelter Foo
Start time 14:00
Duration 01:00
ID 2002
Event type Lecture
Track Hacking
Language English

Cryptographic key recovery from Linux memory dumps

Does dm-crypt and cryptoloop provide expected security when facing modern computer forensics techniques?

Cryptoloop and dm-crypt are the two disk encryption solutions provided by the stock Linux kernel. This lecture will describe in detail how to find and reuse cryptoloop and dm-crypt keys from kernel memory.

When disk encryption is done right it is virtually impossible to break, but as with any security function it is never stronger than its weakest link. Out of necessity keys needs to be stored in cleartext in memory during usage and can be collected by anyone with access to a memory dump of the system.

This presentation will go into the details of how cryptographic keys used by dm-crypt and cryptoloop are stored and used in the Linux 2.6 kernel-series and how they can be recovered and reused.

Archived page - Impressum/Datenschutz