Secure the MBR, Solution here .....

Discussion in 'other security issues & news' started by StevieO, Jul 30, 2009.

Thread Status:
Not open for further replies.
  1. StevieO

    StevieO Registered Member

    Joined:
    Feb 2, 2006
    Posts:
    1,067
    Secure the MBR from overwriting.

    Yes indeed folks, it appears you can, with a little, err, lot of help from Peter Kleissner.

    He's done it to help secure Truecrypt, but it must also help prevent nasty Malware writes to the MBR too ?

    I'm not sure how to apply this patch, so if anyone can explain that would be nice.


    "My “SecureTrueCrypt” patch to secure TrueCrypt: http://peterkleissner.com/?p=11


    Thanx Pete.
     
  2. lotuseclat79

    lotuseclat79 Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    5,390
    With any Linux Live CD, you can issue the dd command to copy the MBR to an output filename. I have both of my main (WinXP, Linux) MBRs stored on my Linux disk in a subdirectory of my home account - accessible easily from the Live CD environment, and I already had to use it once to replace the WinXP hard drive's MBR to correct a problem.

    The output file of the dd command of the full MBR's contents can easily be stored on any other available media, e.g. floppy, CD, etc.

    Example: Note: the first 1024 bytes contains the partition table and boot record for the drive /dev/hda
    1) To save the MBR
    # dd if=/dev/hda of=/tmp/stuff bs=1k count=1
    2) To replace the MBR
    # dd if=/tmp/stuff of=/dev/hda bs=1k count=1

    If the file /tmp/stuff becomes garbage, replacing it back into the MBR will hose the MBR.

    Instead of /tmp/stuff, use a new directory, and prefer a file name that identifies what the MBR file is, /MBRs/hdambr instead of using /tmp/stuff from the examples, and don't forget to change the names when you issue the dd commands for real. Better yet, format and store the file to a USB flash drive for easy access from a Live CD environment or USB flash drive bootable environment.

    -- Tom
     
  3. Airflow

    Airflow Registered Member

    Joined:
    Jul 5, 2009
    Posts:
    39
    hohoho, very keen and cheeky no response so far?:D :D
     
  4. Mrkvonic

    Mrkvonic Linux Systems Expert

    Joined:
    May 9, 2005
    Posts:
    10,223
    Well if you need a reply, the author uses provocative title to evoke responses. What the TrueCrypt guys say is correct - once you have access to the computer locally, game over. And it's true.

    As to attacks against TC and anything else - don't get crap installed on your machine and you won't have any attacks. Pure and simple.

    Mrk
     
  5. Airflow

    Airflow Registered Member

    Joined:
    Jul 5, 2009
    Posts:
    39
    No the only true and bulletproof concept has to be: work secure even in a infected environment.
     
  6. Mrkvonic

    Mrkvonic Linux Systems Expert

    Joined:
    May 9, 2005
    Posts:
    10,223
    Airflow, take whatever you want. Work secure in infected environment, gimme a break, please. There is thing why executables files are called executable, it's the fact that they need to be executed to execute, hence keep you trigger finger off the mouse and don't click to install crap and you work securely in non-infected environment. Pure magic.
    Mrk
     
  7. noone_particular

    noone_particular Registered Member

    Joined:
    Aug 8, 2008
    Posts:
    3,798
    Encryption is only as secure as the computer it's installed on. There's too much emphasis put on the strength of the encryption algorithm and the encryption software itself. The weak link, the OS itself needs to be equally secure. One missed keylogger, trojan, or rootkit defeats encryption.

    The link isn't describing a TrueCrypt problem. It's describing a security policy that's inadequate for the situation. Any PC containing data sensitive enough to require the use of strong encryption should be completely locked down, not running some run of the mill default-permit based security package.
     
  8. Windchild

    Windchild Registered Member

    Joined:
    Jun 16, 2009
    Posts:
    571
    Mrkvonic and noone_particular already said it better than I could. They're absolutely right. Encryption doesn't help if the system is infected with something when the user decrypts whatever they had been trying to protect with encryption. Sure, if you never decrypt what you had encrypted - say a file called my_password.txt - then it's fairly impossible for any malware infection to steal that encrypted data in readable form. But if you do decrypt it while the malware is running - or in this case, when something has written itself into your MBR - then the encryption is helpless from that point on.

    People who suggest TrueCrypt could do something to completely prevent attacks like this are dreaming, and just do not understand the issue. Don't give malware admin privileges and they can't do anything to your MBR. If you want to give malware admin privileges, don't act surprised and disappointed when it can do anything. That's what admin privileges are for - being able to do anything, with practically no limits. No matter how many bandaids and "fixes" to third party software one installs, admin privileges are still admin privileges, and once a malware gets them, then it can do anything. And don't give people you don't trust physical access to your PC. If you do, then there's all kinds of nastiness they can pull - like, say, just stealing your entire computer, which to me would be a lot more annoying than a silly trick like this "BootKit." Run as a limited user, and physically secure the system, and this is not an issue.
     
  9. Airflow

    Airflow Registered Member

    Joined:
    Jul 5, 2009
    Posts:
    39
    What we need is something between admin and non-admin, a installation mode.
     
  10. Mrkvonic

    Mrkvonic Linux Systems Expert

    Joined:
    May 9, 2005
    Posts:
    10,223
    You have rings 1 and 2 and they are not used, except on OS/2.
    Mrk
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.