article thumbnail

Security of Solid-State-Drive Encryption

Schneier on Security

Interesting research: " Self-encrypting deception: weaknesses in the encryption of solid state drives (SSDs) ": Abstract: We have analyzed the hardware full-disk encryption of several SSDs by reverse engineering their firmware. We conclude that one should not rely solely on hardware encryption offered by SSDs.

article thumbnail

FujiFilm printer credentials encryption issue fixed

Pen Test Partners

With the default configuration of these printers, it’s possible to retrieve these credentials in an encrypted format without authenticating to the printer. A vulnerability in the encryption process of these credentials means that you can decrypt them with responses from the web interface. This is the IV for the encryption algorithm.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Types of Encryption, Methods & Use Cases

eSecurity Planet

Encryption scrambles data to make it unreadable to those without decryption keys. Proper use of encryption preserves secrecy and radically lowers the potential damage of a successful cybersecurity attack. Encryption algorithm types will provide an overview of the mathematical algorithms used to encrypt data (AES, RSA, etc.),

article thumbnail

Dynamic analysis of firmware components in IoT devices

SecureList

As a rule, this means that the source code of the device’s firmware is unavailable and all the researcher can use is the user manual and a few threads on some user forum discussing the device’s operation. The vulnerability assessment of IoT/IIoT devices is based on analyzing their firmware.

article thumbnail

Researchers extract master encryption key from Siemens PLCs

CSO Magazine

Security researchers have found a way to extract a global encryption key that was hardcoded in the CPUs of several Siemens programmable logic controller (PLC) product lines, allowing them to compromise their secure communications and authentication.

article thumbnail

Firmware Fuzzing 101

ForAllSecure

Netgear N300 MIPS firmware image. Binary Ninja (or other disassembler) and a strong knowledge of reverse engineering. What's Special about Firmware? Fuzzing firmware presents a specific set of challenges that are not often present together in other targets. Is a MIPS Linux firmware. Extracting Firmware.

article thumbnail

Firmware Fuzzing 101

ForAllSecure

Netgear N300 MIPS firmware image. Binary Ninja (or other disassembler) and a strong knowledge of reverse engineering. What's Special about Firmware? Fuzzing firmware presents a specific set of challenges that are not often present together in other targets. Is a MIPS Linux firmware. Extracting Firmware.