How to clone RSA SecureID software tokens!

Security analyst, Behrang Fouladi from SensePost, an organization specializing in information security, demonstrates how easy it is to clone RSA SecureID software tokens and provides a step-by-step explanation of his analysis. In his explanation Fouladi shows how a potential attacker could easily calculate the target token’s device serial number and bypasses the device-binding protection, and how to obtain the RSA seed value. Finally, he suggests the use of the Trusted Platform Module (TPM) on devices that support this technology as a counter measure against these issues!

Read Behrang Fouladi’s full explanation here –

About The Author

Leave a Comment

Your email address will not be published. Required fields are marked *

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Scroll to Top