Is there any way to get the values from the Windows Random Number Generator and use those numbers to compromise https transmission?
From what I have read the system gathers entropy by looking up the value of the “Seed” registry key (REG_BINARY) in 70 | Windows 8 Heap Internals HKEY_LOCAL_MACHINE\SYSTEM\RNG. This key is 76 bytes in size, whereas the last 64 bytes hold a unique hash used to seed the CryptoAPI PRNG. This is for Windows 8 which I am not sure if it is any different for Windows 10.
Aucun commentaire:
Enregistrer un commentaire