Scary exercise
Try this on a computer you use often:
# export HISTFILE=/dev/null # grep secret /dev/sda /dev/sdb Binary file /dev/sda matches Binary file /dev/sdb matches
Substitute secret for a secret password that should never be stored in clear text in any persistent storage. For instance your system account password, disk encryption key, GPG private key passphrase, etc. Note that entering your secrets on the command line like that has dangers beyond Bash history logging, so it's only safe to do this experiment with a password that you just changed.
If grep returns no hits, great. Your secret is safe from this particular attack. In my case however the fun part was in finding out why exactly the password that supposedly never leaves volatile RAM appeared in clear on all of the computer's hard drives (and the machine in question doesn't even have swap enabled).
Hi there,
Nice blog.
http://zanetworking.wordpress.com/2008/08/01/is-your-ram-chained-to-your-servers/ may be of interest to you I made mention of some cold boot attacks as well.