Security Risks of Firewire and PCMCIA DMA
Security Risks of Firewire and PCMCIA DMA
am 06.06.2007 06:34:05 von Privacy
Does anyone know of a way to mitigate or totally eliminate the risks
of firewire and PCMCIA direct memory access on a running Windows XP
system that has the keyboard/mouse/screen locked out?
Everything I've ever read has said just live with the risk because
there's nothing you can do about it. Some have suggested just plugging
the ports with epoxy. That's not a good solution and can probably be
bypassed.
The problem seems to be that no matter how diligent you are, there's
no software solution to this. These ports have direct access to RAM,
so they can do virtually anything to your system. I'm sure there's a
solution out there, but I have yet to run accross it.
Re: Security Risks of Firewire and PCMCIA DMA
am 06.06.2007 06:44:40 von Privacy
Sorry, I should have posted to all groups simultaneously.
On Jun 6, 12:30 am, Privacy wrote:
> Does anyone know of a way to mitigate or totally eliminate the risks
> of firewire and PCMCIA direct memory access on a running Windows XP
> system that has the keyboard/mouse/screen locked out?
>
> Everything I've ever read has said just live with the risk because
> there's nothing you can do about it. Some have suggested just plugging
> the ports with epoxy. That's not a good solution and can probably be
> bypassed.
>
> The problem seems to be that no matter how diligent you are, there's
> no software solution to this. These ports have direct access to RAM,
> so they can do virtually anything to your system. I'm sure there's a
> solution out there, but I have yet to run accross it.
Re: Security Risks of Firewire and PCMCIA DMA
am 06.06.2007 07:36:04 von comphelp
Privacy writes:
> Does anyone know of a way to mitigate or totally eliminate the risks
> of firewire and PCMCIA direct memory access on a running Windows XP
> system that has the keyboard/mouse/screen locked out?
>
> Everything I've ever read has said just live with the risk because
> there's nothing you can do about it. Some have suggested just plugging
> the ports with epoxy. That's not a good solution and can probably be
> bypassed.
>
> The problem seems to be that no matter how diligent you are, there's
> no software solution to this. These ports have direct access to RAM,
> so they can do virtually anything to your system. I'm sure there's a
> solution out there, but I have yet to run accross it.
I read an article in eweek about some software based solutions out
there that seek to mitigate these issues.
I'll be damned if I can find it though.
Okay, I found something familiar. There's a mention of Safend's Port
Protector product in this article, but it's aging.
http://www.eweek.com/article2/0,1759,1840131,00.asp
I think similar other products exist, but that's about all I can tell
ya. Might be something to look into anyway.
Physical access to a machine has always been where the buck stops
though... it's just scary how quickly a machine can be infected with a
USB port open...
--
Todd H.
http://www.toddh.net/
Re: Security Risks of Firewire and PCMCIA DMA
am 20.06.2007 09:35:49 von Andrew
On Jun 6, 8:34 am, Privacy wrote:
> Does anyone know of a way to mitigate or totally eliminate the risks
> of firewire and PCMCIA direct memory access on a running Windows XP
> system that has the keyboard/mouse/screen locked out?
try devicelock (www.devicelock.com).
Re: Security Risks of Firewire and PCMCIA DMA
am 20.06.2007 15:22:08 von Sebastian Gottschalk
Andrew wrote:
> On Jun 6, 8:34 am, Privacy wrote:
>> Does anyone know of a way to mitigate or totally eliminate the risks
>> of firewire and PCMCIA direct memory access on a running Windows XP
>> system that has the keyboard/mouse/screen locked out?
>
> try devicelock (www.devicelock.com).
Why should he? It's a hardware issue.