24.11.2016 Views

Not So Random

Not%20So%20Random%20-%20Exploiting%20Unsafe%20Random%20Number%20Generator%20Use

Not%20So%20Random%20-%20Exploiting%20Unsafe%20Random%20Number%20Generator%20Use

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Exploitation Theory<br />

• Want to obtain secret values generated via a PRNG, e.g. password<br />

reset token<br />

• Can observe some output from the PRNG; e.g. own password reset<br />

tokens, other values generated via the same PRNG<br />

• PRNGs are deterministic; if we obtain the internal state of the PRNG,<br />

we can predict future output<br />

• Goal is to obtain internal state of the PRNG<br />

<strong>Not</strong> <strong>So</strong> <strong>Random</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!