Stories
Slash Boxes
Comments

SoylentNews is people

posted by janrinok on Saturday November 29 2014, @03:22PM   Printer-friendly
from the old-school-hacking dept.

I ran across this article from last year again and it got me thinking. The article is a story about how a hardware hacker was able to hack hard drive firmware, first to upload his own firmware, but also to take advantage of the embedded controller, and even install linux on the controller. If you haven't read it it's fairly impressive. [Ed's Comment: I would go further and say that it is a amazing piece of hacking, in the traditional meaning of the word.]

It seems that lately there have been a lot of vulnerabilities targeting embedded peripherals. Those in the article come to mind, also badUSB, and some IPMI vulnerabilities.

What do you think? Are the number of attack vectors targeting embedded peripherals a consequence of more powerful controllers? Worse software? More sophisticated attackers? Or just a random occurrence?

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 2) by sjames on Saturday November 29 2014, @08:45PM

    by sjames (2882) on Saturday November 29 2014, @08:45PM (#121162) Journal

    For bonus points, hold a write in cache as if the zeros had been overwirtten. That way it would withstand at least a cursory examination of the 'blank' areas.

    For cases where loss of the data is more acceptable than having it discovered, let the write succeed and start wiping the encrypted volume.

    Starting Score:    1  point
    Karma-Bonus Modifier   +1  

    Total Score:   2  
  • (Score: 2) by maxwell demon on Saturday November 29 2014, @09:24PM

    by maxwell demon (1608) Subscriber Badge on Saturday November 29 2014, @09:24PM (#121167) Journal

    You could also reuse the spare sectors (used by the drive as replacement if regular sectors fail) for storing such test writes. Then it would even survive a power cycle, provided the written data doesn't exceed the spare sector capacity.

    --
    The Tao of math: The numbers you can count are not the real numbers.
  • (Score: 2) by davester666 on Sunday November 30 2014, @06:40AM

    by davester666 (155) on Sunday November 30 2014, @06:40AM (#121220)

    Well, you've already lost on the data, because it's in the hands of someone else, so it's gone. If the data was that important to you, you needed to find a better place to store it than you did.