Brute-Forcing Lockdown Harddrive PIN Codes

Presented at Black Hat USA 2016, Aug. 3, 2016, 5:30 p.m. (30 minutes).

This presentation demonstrates a method of brute-forcing an AES-256 encrypted hard drive by spoofing the front-panel keyboard. In addition to tears into the internal design of the hard drive, and extends the work by J. Czarny & R. Rigo to validate the (in)security of any encrypted drive based on the MB86C311 chipset.

Presenters:

  • Colin O'Flynn
    Colin O'Flynn has developed the world's first open-source platform for side-channel power analysis and glitching attacks, and has spoken around the world about the application of this platform to various targets. Previously he worked with Atmel developing low-power wireless embedded systems, and continues to write about FPGAs for Circuit Cellar magazine. He lives in Halifax, NS, Canada.

Links:

Similar Presentations: