4.9 • 696 Ratings
🗓️ 16 November 2016
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Wednesday, November 16th, 2016 edition of the Sandton and Storm Center's |
0:06.6 | Stormcast. My name is Johannes Ulrich, and I'm recording from Jacksonville, Florida. |
0:13.1 | An interesting vulnerability has been found in the Linux Unified Key Setup or Lux. If you ever used |
0:19.8 | Linux with encrypted disks, you may have run into |
0:23.6 | this particular system. It essentially allows you to encrypt partitions on Linux. |
0:29.6 | Now the problem here is that you still boot off an unencrypted partition. |
0:35.6 | And due to this vulnerability vulnerability if you just keep the |
0:39.4 | energy pressed for about one to two minutes then you end up with a busy box |
0:47.1 | shell that will give you full access to the system now full access I have to |
0:53.3 | qualify this a little bit it It does not allow you to |
0:56.6 | access any of the encrypted drives, but it does allow you to manipulate the boot sector, which |
1:03.4 | of course then could be used to leverage additional attacks against the system. Now, this is really |
1:09.8 | no different than an attacker booting the system off an alternate |
1:14.6 | boot media like a USB drive or a CD-ROM disk. |
1:19.6 | So this is really a problem for users that count on, for example, disabling all of these |
1:25.6 | alternative boot media in order to protect a system |
1:29.2 | where they're afraid that an attacker has physical access to the system. And after all, |
1:34.5 | encrypting partitions is usually done just because you are afraid of someone gaining physical access |
1:40.8 | to the system. There's a quick workaround for this. |
1:44.9 | All you have to do is add panic equals five to your crop boot parameters. |
1:50.0 | There are patches in the work for all the major distributions. |
1:54.0 | They may already hit by the time you're listening to this podcast. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.