top | item 9074688

(no title)

kurokikaze | 11 years ago

Aaaand here it is: http://blog.erratasec.com/2015/02/extracting-superfish-certi...

discuss

order

nsxwolf|11 years ago

Why did he expect to find the password in the clear in the memory dump? He indeed found it there, but why would one expect to?

Xylakant|11 years ago

The password to the key must be in the binary - either in clear or encoded form and at some point it needs to be in memory in decoded form. Otherwise the binary could not decode the key itself. You could drop the passphrase immediately after decoding the key to make it harder for the attacker, but fundamentally all info to decode the key must be somewhere on the machine itself.

Trying all strings from the binary if any of them matches is a cheap and easy operation, so try it first, if it doesn't work use a more elaborate approach.

geococcyxc|11 years ago

Because it is needed to decrypt the key and as the program uses it, it must be in memory (at least at some time).

scott_s|11 years ago

He didn't find the password in the clear, he found the private key in the clear. He brute-forced the password.

I assume his reasoning for looking for the private key was similar to: this program creates a new certificate authority and installs it on this computer. In order to do this, it must have all necessary tools for doing so, including the private key it uses to create those certificates, in memory somewhere. Even if that private key is stored encrypted somewhere, it has to exist unencrypted in memory at some point to be used.

betenoire|11 years ago

the nature of writing a blog post ex post facto?