Brute-Forcing Lockdown Harddrive PIN Codes

Black Hat USA 2016

Presented by: Colin O'Flynn
Date: Wednesday August 03, 2016
Time: 17:30 - 18:00
Location: Jasmine Ballroom

This presentation demonstrates a method of brute-forcing an AES-256 encrypted hard drive by spoofing the front-panel keyboard. In addition to tears into the internal design of the hard drive, and extends the work by J. Czarny & R. Rigo to validate the (in)security of any encrypted drive based on the MB86C311 chipset.

Colin O'Flynn

Colin O'Flynn has developed the world's first open-source platform for side-channel power analysis and glitching attacks, and has spoken around the worldabout the application of this platform to various targets. Previously heworked with Atmel developing low-power wireless embedded systems, andcontinues to write about FPGAs for Circuit Cellar magazine. He lives inHalifax, NS, Canada.


KhanFu - Mobile schedules for INFOSEC conferences.
Mobile interface | Alternate Formats