dragonbane

NVSI Attack

Mar 5th, 2018
112
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 0.65 KB | None | 0 0
  1. Possible Attack
  2.  
  3. Prep:
  4.  
  5. -replace existing useless function to logcat the entire tsecmiscregion
  6. -call function before/after every tsecmodule call with tsecmiscptr to log whats going on
  7. -complete several verifications
  8.  
  9. Attack:
  10.  
  11. -do challenge request and server response normally passing it through the challenger tsec
  12. -complete device auth normally and respond with prior legit session key and secret
  13. -after the server responds with nonce and the "wrong" random key, spool back a prior legit session to RandState, ProtocolState and adjust stateSignature and randSignature
  14. -client will act deterministic again. google fake key isnt used for anything so w/e
Add Comment
Please, Sign In to add comment