5/18/2023 0 Comments Absolute lojack amtThis is not the only aspect that makes Lojack an appealing target. Once an attacker properly modifies this value then the double-agent is ready to go. The Lojack agent protects the hardcoded C2 URL using a single byte XOR key however, according to researchers it blindly trusts the configuration content. The aforementioned researchers suggest the binary modification of the "small agent" is trivial. The agent achieves this persistence through a modular design as noted by Vitaliy Kamlyuk, Sergey Belov, and Anibal Sacco in a presentation at Blackhat, 2014 ( Figure 1): Figure 1: Lojack persistence mechanism (Paraphrased from …). Lojack can survive hard drive replacements and operating system (OS) re-imaging. Additionally, it can delete files, making it an effective laptop theft recovery and data wiping platform. LoJack for Laptops and Computrace are products of Absolute, not LoJack or CalAmp.Ībsolute Software, the creator of Lojack, says on its website ( ) that the agent can locate and lock a device remotely.
0 Comments
Leave a Reply. |