Based on the recent research that showed passwords were stored in memory and could be accessed through a cold-boot attack, a new tool has been announced at CanSecWest. The Register reports:
DaisyDukes is a memory sniffer that resides on a USB device. A researcher can plug it into an unattended machine that is turned on but has been locked and reboot the machine off a compact operating system contained on the drive. Depending on the user’s needs, it can be configured to capture the entire contents of a computer’s memory, or sniff out only certain types of data – say a password to access the company network or unlock a user’s private encryption key
Wish I had a memory sniffer for real life. That would be a real time saver.
Paper and pencil? :-)