Windows XP FireWire Attack Also Defeats Windows Vista - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Software // Enterprise Applications
04:32 PM
Connect Directly

Windows XP FireWire Attack Also Defeats Windows Vista

Microsoft may not address the "winlockpwn" authentication bypass issue because it's not technically a vulnerability, researchers said.

A two-year old authentication bypass technique that received wide attention earlier this week as a means to get around Windows XP password protection also works on Windows Vista, a report released on Wednesday reveals.

On Monday, New Zealand-based security researcher Adam Boileau released "winlockpwn," software for bypassing Windows XP SP2 authentication using a Linux PC connected via FireWire to a target Windows PC. He also explained that the technique works against computers running Linux, Mac OS X, and BSD Unix.

On his Web site, Boileau said Microsoft doesn't consider the attack a legitimate security vulnerability. Indeed, as Microsoft points out in the third of its 10 Immutable Laws of Security, "If a bad guy has unrestricted physical access to your computer, it's not your computer anymore."

Two weeks ago, researchers from Princeton University, the Electronic Frontier Foundation, and Wind River Systems reaffirmed this proposition when they released details about how encryption keys for disk-based encryption systems could be recovered more easily by chilling a computer's memory chips.

Peter Panholzer of SEC Consult Vulnerability Lab, based in Vienna, Austria, said in a paper released on Wednesday that his company has demonstrated a proof-of-concept attack on Windows Vista using its own Vista unlock tool.

"In short, our Vista unlock tool uses signature matching to find the respective binary code in the target node's memory (the same method is used in winlockpwn)," Panholzer explained. "The process of searching the pattern and manipulating the DLL code in memory takes a few seconds up to a few minutes. After the patch has been applied, any username and password can be specified at the login prompt for a successful login."

Panholzer doubts Microsoft will address the issue of FireWire authentication bypass because it's not technically a vulnerability; rather he said it's the way the protocol is designed.

"The only known effective way of protecting against the FireWire attack is to deactivate all FireWire and PC Card ports in the device manager," he said.

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
The State of Chatbots: Pandemic Edition
Jessica Davis, Senior Editor, Enterprise Apps,  9/10/2020
Deloitte on Cloud, the Edge, and Enterprise Expectations
Joao-Pierre S. Ruth, Senior Writer,  9/14/2020
Data Science: How the Pandemic Has Affected 10 Popular Jobs
Cynthia Harvey, Freelance Journalist, InformationWeek,  9/9/2020
White Papers
Register for InformationWeek Newsletters
Current Issue
IT Automation Transforms Network Management
In this special report we will examine the layers of automation and orchestration in IT operations, and how they can provide high availability and greater scale for modern applications and business demands.
Flash Poll