- 注册时间
- 2025-9-14
- 最后登录
- 2025-9-19
- 阅读权限
- 10
- 积分
- 26
- 精华
- 0
- 帖子
- 6

|
We analyze the prandom pseudo random quantity generator (PRNG) in use within the Linux kernel (which is the kernel of the Linux working system, as well as of Android) and show that this PRNG is weak. The prandom PRNG is in use by many "consumers" in the Linux kernel. We centered on three shoppers at the network level - the UDP supply port era algorithm, the IPv6 flow label generation algorithm and the IPv4 ID technology algorithm. The flawed prandom PRNG is shared by all these customers, which permits us to mount "cross layer attacks" towards the Linux kernel. In these assaults, we infer the interior state of the prandom PRNG from one OSI layer, and use it to both predict the values of the PRNG employed by the other OSI layer, or to correlate it to an internal state of the PRNG inferred from the opposite protocol. Using this method we will mount a very efficient DNS cache poisoning attack in opposition to Linux.
Take a look at my website; iTagPro device |
|