YoVDO

Bypassing Self-Encrypting Drives in Enterprise Environments

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Data Protection Courses

Course Description

Overview

Explore a critical vulnerability in Self-Encrypting Drives (SED) that allows bypassing their protection mechanisms in enterprise environments. Learn about the advantages and disadvantages of hardware-based encryption, the Opal standard, and various attack vectors including forced restarts, soft resets, and key capture. Understand the impact of these vulnerabilities on organizations using SED and discover how to protect against this new threat. Gain insights into the inner workings of drives, previous research in the field, and real-world demonstrations of exploits. Delve into the technical aspects of Full-Disk Encryption (FDE) solutions and their implementation in enterprise settings.

Syllabus

Introduction
Daniels Background
Classical Full Disk Encryption
Advantages and Disadvantages
HardwareBased Encryption
HardwareBased Encryption Advantages
HardwareBased Encryption Overview
Opal Standard
Key Encryption
Microsoft Encrypted Drive
Custom Encrypted Drives
Open Technology
Previous Research
System Area
How Drives Work
Opel Standard
Previous Work
Demo
Miller Research
User Perspective
Forced Restart Attack
Soft Reset
Shorting Memory Pins
Triggering Crashes
Blue Screen of Death
Lenovo laptops
User options
Power cycle
Hot unplug attack
SATA extension
Key capture attack
Have I been hacked
TCG disclosure
Vulnerability notes
Impact of vulnerabilities
Questions


Taught by

Black Hat

Related Courses

Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security Chip
Black Hat via YouTube
Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube
AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube
Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube
Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube