Andrew " bunnie " Huang along with Sean " xobs " Cross have discerned an approach to hack even the tiny microSD cards set within contemporary smartphones and tablets to enlarge the storage space , as well as complementary way flash memory based outs , offering its result in the Chaos Computer Congress ( 30C3 ) . In an extensive article on entry bunnie : studios, Huang elucidated how the court process works , along with the reason for various flash memory cards tend to be hacked commonly used for malicious purposes by citizens who are aware of this meticulous potentially susceptibility serious security.
The difficulty is to enable flash memory is not without flaws, and building corporations supported flash devices are expected to "fix" the problems with the help of hardware class software running on a micro controller and is able to cope with faults and terrible parts. The firmware that makes the " corrections" likely resides on a micro controller based on ARM that moves at speeds up to 100 MHz, and that the charges only about $ 0.15 to $ 0.30 to understand each storage device flash.
However, the software pre - Taxed is germ-free , and therefore responsible for flash storage space required to modernize . In several cases, the micro controller with its firmware are not protected either, so that's where the hackers are able how to take profit of these chain "defects " coming in. They would be able to replace the firmware evade in the micro controller with malware that will be responsible for "the man in the middle attacks " - the flash drive storage space act in one way , but you would distinctly instead. Committed Cards can not be detected with custom security protocols , as there is no standard protocols instead of trying these hacks. The only way to deal with a concession would actually destroy .
In the accumulation of microSD cards , plus form of flash memory can be exaggerated by the cuts , along with more SD MMC cards "as the eMMC addition to the iNAND devices usually connected to the main boards of the smartphones more used to hoard the operating system and other data from private customers, " Huang writes . however the USB flash , plus SSDs may have similar vulnerabilities.
In a current story Der Spiegel to complete some exploration operations of the NSA, it was discovered that the company can take advantage of the firmware designed by companies to establish a variety of malware spy hard drives.
ليست هناك تعليقات:
إرسال تعليق