Windows passwords easily bypassed over Firewire
![](https://s.yimg.com/ny/api/res/1.2/V6jA8jR_yKXyFU1dft.gxA--/YXBwaWQ9aGlnaGxhbmRlcjt3PTQyMDtoPTQ1OA--/https://s.yimg.com/uu/api/res/1.2/ukmd46r_3nkS5pZxVFnJ5w--~B/aD0yNDA7dz0yMjA7YXBwaWQ9eXRhY2h5b24-/https://www.blogcdn.com/www.engadget.com/media/2008/03/3-4-08-firewire.jpg)
All of the sudden we're starting to see more and more attacks take advantage of what's stored on your computer's RAM -- the latest, from New Zealand's Adam Boileau, allows an attacker to unlock Windows passwords in a just a few seconds using a Linux machine connected over Firewire. Unlike those disk encryption attacks we saw that required a reboot, Boileu's attack works while the target computer is running, tricking Windows into allowing full write access to RAM and then corrupting the password protection code. That's a little scary -- but other researchers say that it's not a traditional vulnerability, since direct memory access is a feature of Firewire. Still, we're sealing up all of our ports with Silly Putty starting today, that ought to stop 'em.
Update: Apparently this has been demonstrated on OS X as well -- it looks like Firewire's direct memory access is the common vector here.
[Thanks, Drew]