Brute-Forcing Lockdown Harddrive PIN Codes

by Colin O'Flynn Sept. 15, 2017 via submitted by belen_caty

This presentation demonstrates a method of brute-forcing an AES-256 encrypted hard drive by spoofing the front-panel keyboard. In addition to tears into the internal design of the hard drive, and extends the work by J. Czarny & R. Rigo to validate the (in)security of any encrypted drive based on the MB86C311 chipset.

Steven Ulm 4 weeks, 1 day ago

I know that your presentation is very specific, but I would like to read more (maybe in the future?) about the AES-256.