Subverting BitLocker With One Vulnerability
Offered By: Hack In The Box Security Conference via YouTube
Course Description
Overview
Explore a critical vulnerability in Trusted Platform Module (TPM) that can subvert BitLocker encryption in this 29-minute conference talk from Hack In The Box Security Conference. Dive into the details of how both hardware-based discrete TPM (dTPM) and firmware-based TPM (fTPM) can be exploited to extract the Volume Master Key (VMK) of BitLocker without physical access. Learn about the novel sleep mode vulnerability affecting both dTPM and fTPM, including the newly discovered CVE-2020-0526 related to Intel Platform Trust Technology (PTT). Discover how this vulnerability allows forging of Platform Configuration Registers (PCRs), compromising the core protection mechanism of BitLocker. Gain insights into the custom tool 'BitLeaker' that leverages these vulnerabilities to decrypt BitLocker-locked partitions. Understand the intricacies of BitLocker's VMK protection process, its reliance on TPM, and explore potential countermeasures to mitigate these security risks.
Syllabus
#HITBCyberWeek #CommSec D1 - Subverting Bit Locker With One Vulnerability
Taught by
Hack In The Box Security Conference
Related Courses
Browser Hacking With ANGLEHack In The Box Security Conference via YouTube Can A Fuzzer Match A Human
Hack In The Box Security Conference via YouTube Biometrics System Hacking in the Age of the Smart Vehicle
Hack In The Box Security Conference via YouTube ICEFALL - Revisiting A Decade Of OT Insecure-By-Design Practices
Hack In The Box Security Conference via YouTube Fuzzing the MCU of Connected Vehicles for Security and Safety
Hack In The Box Security Conference via YouTube