Python and crypto-strength random numbers by default
Python and crypto-strength random numbers by default
Posted Sep 16, 2015 17:38 UTC (Wed) by jtaylor (subscriber, #91739)Parent article: Python and crypto-strength random numbers by default
By good I mean for example a properly seeded MT or similar, not hilariously broken stuff like linear congruential with poor parameters or the Debian ssl key bug.
Posted Sep 16, 2015 18:49 UTC (Wed)
by jimparis (guest, #38647)
[Link]
This paper describes PRNG attacks and has some real-world examples of a many PHP applications with PRNGs that were vulnerable in some form. It seems like the most frequent attack is in things like password reset tokens: request a password reset yourself, check your email and figure out the server's PRNG state, request a password reset for your victim, and use the known PRNG state to predict their token:
This page describes an online betting-type game where the attacker was able to predict results from previous ones:
These slides describe an attack on WPS that involves figuring out the PRNG state (slide 15):
Python and crypto-strength random numbers by default
http://www.icir.org/vern/papers/witty-imc05.pdf
https://media.blackhat.com/bh-us-12/Briefings/Argyros/BH_...
http://jonasnick.github.io/blog/2015/07/08/exploiting-csg...
http://www.slideshare.net/0xcite/offline-bruteforce-attac...