Attacking Encrypted USB Keys the Hard(ware) Way

  Рет қаралды 44,303

Black Hat

Black Hat

Күн бұрын

Ever wondered if your new shiny AES hardware-encrypted USB device really encrypts your data - or is just a fluke? If you have, come to our talk to find out if those products live up to the hype and hear about the results of the audit we conducted on multiples USB keys and hard drives that claim to securely encrypt data.
By Elie Bursztein, Jean-Michel Picod & Rémi Audebert
Full Abstract & Presentation Materials:
www.blackhat.c...

Пікірлер: 49
@briancarnell
@briancarnell 6 жыл бұрын
When I want to secure data on a USB drive, I use Veracrypt or similar software. I always assumed the "encrypted" USB keys you can buy out there are largely garbage.
@cepamoa1749
@cepamoa1749 6 жыл бұрын
issue is that veracrypt do not run well on all platform. On my fedora27 it does not in gui making end user usage not likely as you need command line foo to make it work.
@briancarnell
@briancarnell 6 жыл бұрын
That makes sense. I assume the market for these "encrypted USB drives" are largely Windows users which is why I mentioned Veracrypt. I assume Linux users would use something like cryptsetup/LUKS.
@kirbfx
@kirbfx 5 жыл бұрын
Why not do both, use Veracrypt on an encrypted USB drive so they must crack the key and then the encrypted vault??
@osamabinladen824
@osamabinladen824 3 жыл бұрын
@@hmm8hql739 Please make it simple. What's the best way to encrypt my SSD?
@georgesamaras2922
@georgesamaras2922 4 жыл бұрын
All that nerdy ways to attack secure chipsets, and everyone just ignores that they used a freaking fingerprint sensor. Imagine if you left you computer password written on tables, drinking glasses, smartphones screens, shop catalogs, doors, handles, police database depending on your history, your smartphone manufacturer, etc. And of course depending on threat model a goverment can use physical violence to obtain a fingerprint. Fingerprint is like the dumbest of the dumbest ideas for key input.
@brendacovert4052
@brendacovert4052 3 жыл бұрын
I'm sorry watching and I totally agree
@NoneNone-rw7bs
@NoneNone-rw7bs 6 жыл бұрын
I'm very impressed. In short the "laymen" term would be that it is very difficult, but possible. And in fact it is currently possible in many instances. So in short, It "Sucks" but needs work.
@kirbfx
@kirbfx 5 жыл бұрын
I recommend using an an encrypted USB that you then encrypt a second time with Veracrpyt or LUKS with a very strong 30 plus multi character password (without using any actual words in any language so it can’t be dictionary cracked) so even if they crack the outer hardware based key 🔑 , they then have to brute force the second veracrpyt key making it much, much more difficult to crack.
@ArchangelTyrael
@ArchangelTyrael 4 жыл бұрын
Then how do you acces your data? Having to type a random 30 character combination sucks if you want to acces your data.
@arabicfoot
@arabicfoot 4 жыл бұрын
Archangel Tyrael stop posting stupid comments
@ArchangelTyrael
@ArchangelTyrael 4 жыл бұрын
@@arabicfoot It’s not stupid. How are you supposed to remember 30 random characters for every site? Write them down and someone can find them. Password manager and they are all in one place. Hackers that get in can now log in to all your accounts. If the manager doesn't work or is unreachable you are locked out of everything.
@gastonhitw720
@gastonhitw720 3 жыл бұрын
@@ArchangelTyrael you have to rely on a hand-written note.....you can also remember the password tho, I use a 27 digit password and I can easily remember it
@adds761
@adds761 6 жыл бұрын
Are the results from each drive they tested published anywhere?
@Baigle1
@Baigle1 6 жыл бұрын
this data is invaluable to consumers and high profile users that need the FIPS usb keys.. we need the brands and models
@cepamoa1749
@cepamoa1749 6 жыл бұрын
i would love that too :)
@over00lordunknown12
@over00lordunknown12 6 жыл бұрын
Does anyone know a drive that will encrypt the data on it like a normal drive, but have a sort of "fail safe" mode? IE: If someone pries the case open, will destroy the data (either by consecutively writing zeros, or electric shock to the chip(s)).
@mohamedfouad2304
@mohamedfouad2304 6 жыл бұрын
over00lord Unknown tom cruise got one
@osamabinladen824
@osamabinladen824 3 жыл бұрын
@@mohamedfouad2304 It burns
@maxicx75v
@maxicx75v 2 жыл бұрын
IIRC there's a separate certification for that, and yes, these exist. No need to overwrite data or shock the chips too: it's sufficient to erase the encryption key and the data will be just unrecoverable random garbage.
@over00lordunknown12
@over00lordunknown12 6 жыл бұрын
5:51 Ough! I *LOVE* tree categories! :D (I can't speak French, so who am I to make jokes about him? :/)
@NoneNone-rw7bs
@NoneNone-rw7bs 6 жыл бұрын
Blackhat is clearly the superior technology because they find all the stupid mistakes tech companies make just to put a component to market as fast as possible. So in short, Technology component developers are only interested in profit, whereas blackhat is all about making things secure. I would assume that Blackhat technology is more expensive. But the one element that no one can ever eliminate is a "mole programmer." And of course state sponsored attacks that have millions if not billions behind the attack.
@Malegys
@Malegys 6 жыл бұрын
are there any subs available for Pépé LePeu here?
@CharlesVanNoland
@CharlesVanNoland 6 жыл бұрын
I'm glad people develop skillz from all over the world and come to BlackHat to share them, but I have a hard time understanding half of the speakers because of their thick accents. I'm sure a slight case of nerves being in front of a bunch of people lends itself to them slipping into the thickest of their tongue while speaking - distracting them from making it a point to articulate as they focus on the material intently. Video subtitles aren't much help if they don't read as what the speaker means either, and mostly just make it harder to understand what's being said :(
@phatpants0917
@phatpants0917 5 жыл бұрын
You listen to enough talks and you start to have an ear for the accents.
@MrTizinator
@MrTizinator 5 жыл бұрын
So basically there is no safe way to encrypt your drive and everything can be hacked? O.o
@theglowingone5643
@theglowingone5643 4 жыл бұрын
you will always be able to bruteforce a encrypted thing. If you can prevent hardware vulnerabilities, you can use strong encryption that would take 1000s of years to calculate. But in encryption USB, there are many hardware loopholes. So instead, get just a normal usb stick but store everything encrypted and decrypt it on your pc with a key. There is software that does this, I forgot its name tho... Ill follow up on this
@theglowingone5643
@theglowingone5643 4 жыл бұрын
Veracrypt is one of those softwares. You can ofc use it on an encryption USB stick so it adds a (very thin) extra layer of security
@dukesoft7211
@dukesoft7211 4 жыл бұрын
Also don't underestimate the power of a big bald guy with a 5$ wrench
@hjembrentkent6181
@hjembrentkent6181 4 жыл бұрын
Use encryption strong enought that all matter in the universe converted to energy would be unsuficcient to do the brute force work.
@Kitulous
@Kitulous 3 жыл бұрын
@@dukesoft7211 that's why you use the "double bottom" option in VeraCrypt - hidden partition
@ciscomalo5731
@ciscomalo5731 6 жыл бұрын
could someone please help me with the latest CEH exam dumps?
@jakec904
@jakec904 6 жыл бұрын
Is this guy from vupen?
@sundhaug92
@sundhaug92 6 жыл бұрын
They're from Google
@Baigle1
@Baigle1 6 жыл бұрын
arent vupen a bunch of dbags that don't release their exploits and only sell to oppressive regimes and tyrannical govts?
@sundhaug92
@sundhaug92 6 жыл бұрын
Baigle1: 1. These guys are not Vupen 2. Vupen no longer exists 3. While it is true that Vupen did not disclose the vulnerabilities they discovered for pwn2own 2012, they did disclose them for pwn2own 2014. 4. While their full customer-list has not been revealed, it is known that it included the US (NSA) and Germany BND) - neither of which are generally recognized as oppressive nor tyrannical. You might be thinking of Hacking Team, which was one of their customers.
@Baigle1
@Baigle1 6 жыл бұрын
Yep it was hacking team, thanks.
@NoneNone-rw7bs
@NoneNone-rw7bs 6 жыл бұрын
Yes, that sucks, :)
@SCITom
@SCITom 3 жыл бұрын
It takes time to get used to French people speaking English, that's a given.
@Ibentheamazing
@Ibentheamazing 6 жыл бұрын
This means that someone can decrypt a USB Key without the password!!!???
@printchipe
@printchipe 6 жыл бұрын
Podem me ajudar? Para área de segurança da informação, devemos ter conhecimentos mais profundos em redes de computadores e infra, ou em programação? Desde já agradeço. Obrigado.
@dexterh6814
@dexterh6814 6 жыл бұрын
hard to understand what he said.. but i got the point tho.
@pureheroin9902
@pureheroin9902 6 жыл бұрын
dexter Heo auto gen captions are pretty good
@hjembrentkent6181
@hjembrentkent6181 4 жыл бұрын
Yeah he said ahfjsdbhfbkajsd
@cesargil5997
@cesargil5997 5 жыл бұрын
All your data are belong to us.
@conreo
@conreo 4 жыл бұрын
🥖
Пришёл к другу на ночёвку 😂
01:00
Cadrol&Fatich
Рет қаралды 8 МЛН
SCHOOLBOY. Мама флексит 🫣👩🏻
00:41
⚡️КАН АНДРЕЙ⚡️
Рет қаралды 7 МЛН
He bought this so I can drive too🥹😭 #tiktok #elsarca
00:22
Elsa Arca
Рет қаралды 49 МЛН
3 Ways To Protect Your Digital Life On The Go
9:28
Shannon Morse
Рет қаралды 25 М.
Hacking Hardware with a $10 SD Card Reader
41:39
Black Hat
Рет қаралды 14 М.
Hacking Windows TrustedInstaller (GOD MODE)
31:07
John Hammond
Рет қаралды 617 М.
Encrypted USB Drives
7:48
ExplainingComputers
Рет қаралды 76 М.
48 Dirty Little Secrets Cryptographers Don’t Want You To Know
50:58
When I accidentally ran ransomware!
7:57
The PC Security Channel
Рет қаралды 169 М.
Cracking Enigma in 2021 - Computerphile
21:20
Computerphile
Рет қаралды 2,5 МЛН
Ichthyology: Phishing as a Science
24:28
Black Hat
Рет қаралды 36 М.
Behind the Scenes of iOS Security
51:32
Black Hat
Рет қаралды 123 М.
Ghidra - Journey from Classified NSA Tool to Open Source
47:36
Пришёл к другу на ночёвку 😂
01:00
Cadrol&Fatich
Рет қаралды 8 МЛН