YoVDO

Subverting BitLocker With One Vulnerability

Offered By: Hack In The Box Security Conference via YouTube

Tags

Hack In The Box Security Conference Courses Cybersecurity Courses

Course Description

Overview

Explore a critical vulnerability in Trusted Platform Module (TPM) that can subvert BitLocker encryption in this 29-minute conference talk from Hack In The Box Security Conference. Dive into the details of how both hardware-based discrete TPM (dTPM) and firmware-based TPM (fTPM) can be exploited to extract the Volume Master Key (VMK) of BitLocker without physical access. Learn about the novel sleep mode vulnerability affecting both dTPM and fTPM, including the newly discovered CVE-2020-0526 related to Intel Platform Trust Technology (PTT). Discover how this vulnerability allows forging of Platform Configuration Registers (PCRs), compromising the core protection mechanism of BitLocker. Gain insights into the custom tool 'BitLeaker' that leverages these vulnerabilities to decrypt BitLocker-locked partitions. Understand the intricacies of BitLocker's VMK protection process, its reliance on TPM, and explore potential countermeasures to mitigate these security risks.

Syllabus

#HITBCyberWeek #CommSec D1 - Subverting Bit Locker With One Vulnerability


Taught by

Hack In The Box Security Conference

Related Courses

Browser Hacking With ANGLE
Hack In The Box Security Conference via YouTube
Can A Fuzzer Match A Human
Hack In The Box Security Conference via YouTube
Biometrics System Hacking in the Age of the Smart Vehicle
Hack In The Box Security Conference via YouTube
ICEFALL - Revisiting A Decade Of OT Insecure-By-Design Practices
Hack In The Box Security Conference via YouTube
Fuzzing the MCU of Connected Vehicles for Security and Safety
Hack In The Box Security Conference via YouTube