| |||||
| |||||
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment: |
Many program written today require the ability to generate pseudo-random values. There are many ways of doing this and most languages and platforms choose unfortunate defaults, allowing attackers to predict the output of these RNGs and launch a variety of practical attacks. I discuss how some of these RNGs work and how they can be exploited. I will also release and discuss a tool for performing RNG prediction.
I am open to either talk length (there is no either option in this form). I recently graduated from Mississippi State University and am currently a security researcher for Dynetics in Huntsville, AL. I primarily work in software reverse-engineering and tool development.
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast