Version Mildenberg
lecture: Public FPGA based DMA Attacking
Most thought Direct Memory Access (DMA) attacks were a thing of the past after CPU vendors introduced IOMMUs and OS vendors blocked Firewire DMA. At least until the PCILeech direct memory access attack toolkit was presented a year ago and quickly became popular amongst red teamers and governments alike.
A year later the situation has improved but some firmware and operating systems still remain vulnerable by default. The hardware used to perform the attacks was however limited both in capabilities and supply. FPGA support was introduced and made available to the public to overcome these problems. In this talk I will subvert kernels, defeat full disk encryption and spawn system shells - all by using affordable publically available FPGAs and open source software!
Info
Day:
2017-12-30
Start time:
00:00
Duration:
00:30
Room:
Saal Clarke
Track:
Hardware & Making
Language:
en
Links:
Files
Feedback
Click here to let us know how you liked this event.
Concurrent Events
Speakers
Ulf Frisk |