Daisy Dukes breaks encryption

Based on the recent research that showed passwords were stored in memory and could be accessed through a cold-boot attack, a new tool has been announced at CanSecWest. The Register reports:

DaisyDukes is a memory sniffer that resides on a USB device. A researcher can plug it into an unattended machine that is turned on but has been locked and reboot the machine off a compact operating system contained on the drive. Depending on the user’s needs, it can be configured to capture the entire contents of a computer’s memory, or sniff out only certain types of data – say a password to access the company network or unlock a user’s private encryption key

Wish I had a memory sniffer for real life. That would be a real time saver.

One thought on “Daisy Dukes breaks encryption”

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.