Bsides LV 2014 - Untwisting The Mersenne Twister: How I killed the PRNG - 05Aug2014

  Рет қаралды 10,290

Bishop Fox

Bishop Fox

Күн бұрын

05 Aug 2014 - Bsides Las Vegas 2014
Joe "moloch" - Bishop Fox
Dan "AltF4" Petro - Bishop Fox
www.bishopfox.com
www.bishopfox.com/blog/2014/08...
www.irongeek.com/i.php?page=vi...
Untwisting The Mersenne Twister: How I killed the PRNG
Applications rely on generating random numbers to provide security, and fail catastrophically when these numbers turn out to be not so “random.” For penetration testers, however, the ability to exploit these systems has always been just out of reach. To solve this problem, we’ve created “untwister:” an attack tool for breaking insecure random number generators and recovering the initial seed.
We did all the hard math, so you don't have to! Random numbers are often used in security contexts for generating unique IDs, new passwords for resets, or cryptographic nonces. However, the built-in random number generators for most languages and frameworks are insecure, leaving applications open to a series of previously theoretical attacks. Lots of papers have been written on PRNG security, but there's still almost nothing practical you can use as a pentester to actually break live systems in the wild. This talk focuses on weaponizing what used to be theoretical into our tool: untwister. Let's finally put rand() to rest.
DISCLAIMER: This video is intended for pentesting training purposes only.

Пікірлер: 9
@Houshalter
@Houshalter 8 жыл бұрын
There are a few, very important, minutes of video missing at 21 minutes.
@anteconfig5391
@anteconfig5391 4 жыл бұрын
Can I ask about why the video seems cut at the beginning and at the 21 min mark?
@tiernanmorgan
@tiernanmorgan 3 ай бұрын
if you know seed is datetime could you use this to reverse enginer a slot machine?
@weedaq
@weedaq 9 жыл бұрын
what is this supposed to be?
@Omnifarious0
@Omnifarious0 5 жыл бұрын
Mersenne Twister is a recipe computers follow to generate a series of numbers that seem to be random. In truth, the numbers are not at all random. And, in fact, after you see a few numbers in the series, it's not that hard to guess what the rest of the numbers are going to be. That doesn't mean Mersenne Twister is bad. It's designed for games and monte carlo simulations (simulations of things that use statistical randomness for certain parts of the simulation). It was never designed to be used in cases where the predictability of the random numbers was a bad thing. From a statistical standpoint, it's very hard to tell the series of numbers generated by Mersenne Twister from a sequence of random numbers. It works very, very well for games and monte carlo simulations. The problem is, uninformed and sloppy programmers use it for generating things like session ids when you log into websites. If session ids are predictable, someone could hijack your session (i.e. start interacting with the website as if they had your password even when they don't) by guessing your session id. This video presents a tool that can be used to guess the rest of the numbers in the sequence given a few numbers from the sequence. This tool can be used to accomplish attacks of the kind I just described. The math involved in figuring this out is non-trivial. And while I haven't watched the video, other comments indicate that the people presenting the tool to not describe at all how it works which is very unsatisfying. The lack of explanation moves the tool closer to the realm of being purely a hacking tool instead of a tool for security researchers. After all, someone who just wants to break into things doesn't really care how the tool works, just that it does.
@naninca
@naninca 4 жыл бұрын
@@Omnifarious0 good explanation
@Omnifarious0
@Omnifarious0 4 жыл бұрын
@@naninca - I'm glad _someone_ appreciated it. :-)
@keeper2828
@keeper2828 6 жыл бұрын
Incredibly poor presentation with near to no explanation whatsoever. "Here's a script, it cracks MT, and that's it". The presenters have no idea what's going on.
NMCS4ALL: Random number generators
20:10
Dave Ackley
Рет қаралды 69 М.
WHO DO I LOVE MOST?
00:22
dednahype
Рет қаралды 75 МЛН
Smart Sigma Kid #funny #sigma #comedy
00:19
CRAZY GREAPA
Рет қаралды 23 МЛН
Неприятная Встреча На Мосту - Полярная звезда #shorts
00:59
Полярная звезда - Kuzey Yıldızı
Рет қаралды 7 МЛН
Randomness is calculated - Linear Congruential Generators Explained
10:48
Stanford Seminar - PCG: A Family of Better Random Number Generators
1:14:48
Beginner's Guide to the Bash Terminal
1:14:37
Joe Collins
Рет қаралды 2,3 МЛН
Random Numbers - Numberphile
11:39
Numberphile
Рет қаралды 1,1 МЛН
I'll Let Myself In: Tactics of Physical Pen Testers
44:56
Wild West Hackin' Fest
Рет қаралды 2,8 МЛН
bg04 untwisting the mersenne twister how i killed the prng moloch
43:21
Adrian Crenshaw
Рет қаралды 1,9 М.
How to Generate Pseudorandom Numbers | Infinite Series
14:19
PBS Infinite Series
Рет қаралды 218 М.
Random is not so random - understanding random in python
26:14
DigitalSreeni
Рет қаралды 2,5 М.
CQTools: The New Ultimate Hacking Toolkit
1:01:55
Black Hat
Рет қаралды 177 М.
How To Unlock Your iphone With Your Voice
0:34
요루퐁 yorupong
Рет қаралды 27 МЛН
Lid hologram 3d
0:32
LEDG
Рет қаралды 8 МЛН
Gizli Apple Watch Özelliği😱
0:14
Safak Novruz
Рет қаралды 4,1 МЛН
APPLE совершила РЕВОЛЮЦИЮ!
0:39
ÉЖИ АКСЁНОВ
Рет қаралды 4,2 МЛН