TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

BitLocker Lockscreen Bypass

571 pointsby rdpintqogeogsaaover 4 years ago

20 comments

sanquiover 4 years ago
Reminds me of this classic Windows 98 (I believe) login screen bypass. <a href="https:&#x2F;&#x2F;i.imgur.com&#x2F;rG0p0b2.gif" rel="nofollow">https:&#x2F;&#x2F;i.imgur.com&#x2F;rG0p0b2.gif</a>
评论 #25814877 未加载
评论 #25814126 未加载
评论 #25810648 未加载
评论 #25810466 未加载
评论 #25812150 未加载
评论 #25811172 未加载
评论 #25812823 未加载
评论 #25812289 未加载
评论 #25817431 未加载
评论 #25811400 未加载
评论 #25816199 未加载
评论 #25814518 未加载
评论 #25813641 未加载
评论 #25817022 未加载
wongarsuover 4 years ago
Microsoft&#x27;s fix seems to have only fixed the sticky-keys dialog [1], apparently by just removing the link to the settings when you are in a lockscreen. So if you manage to find another way to launch the settings from a lockscreen everything else should still work as described.<p>1: <a href="https:&#x2F;&#x2F;msrc.microsoft.com&#x2F;update-guide&#x2F;en-us&#x2F;vulnerability&#x2F;CVE-2020-1398" rel="nofollow">https:&#x2F;&#x2F;msrc.microsoft.com&#x2F;update-guide&#x2F;en-us&#x2F;vulnerability&#x2F;...</a>
评论 #25811317 未加载
评论 #25811911 未加载
评论 #25811608 未加载
评论 #25811767 未加载
dexenover 4 years ago
Related: yesterday&#x27;s post by <i>jwz</i>, &quot;I told you so, 2021 edition&quot; [1], which discusses security bypass in linux screensavers.<p>[1] <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=25801693" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=25801693</a>
zarothover 4 years ago
I really wish there was video of the entire process start to finish.<p>This part in particular seems like it would be incredibly amusing right before the account gets added;<p>&gt; <i>It is easy to see when the loop is running because the Narrator will move its focus box and say “access denied” every second.</i><p>This truly is Hollywood style hacking made real.
miki123211over 4 years ago
Accessibility features are a great source of security vulnerabilities. I rely on them myself, and have personally found or witnessed quite a few.
评论 #25815689 未加载
评论 #25810500 未加载
评论 #25810802 未加载
bixxyyyover 4 years ago
This is not a BitLocker bypass. It&#x27;s a Windows login screen bypass. The BitLocker login is before Windows ever boots. This describes a system where the user has ALREADY bypassed the BitLocker login and has advanced on to the Windows login screen.
评论 #25823661 未加载
Jon_Lowtekover 4 years ago
What does this have to do with Bitlocker?<p>EDIT: i get it now, it plays a small part in the exploit chain because it doesn&#x27;t correctly verify what it sets permissions on when automounting usb drives.
评论 #25810639 未加载
评论 #25812410 未加载
评论 #25810669 未加载
评论 #25810535 未加载
评论 #25811614 未加载
评论 #25810630 未加载
fundatusover 4 years ago
BTW: You can disable the &quot;I forgot my password&quot; thing completely on the login screen by setting this registry key to 0:<p>HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\LogonUI\NgcPin
varispeedover 4 years ago
I wonder if this was left on purpose for law enforcement or corporate spies and if there are more vulnerabilities like this. Seems like it&#x27;s better to just stay with good old TC.
SiebenHeavenover 4 years ago
Excellent example of why one should attempt to limit attack surface.
angry_octetover 4 years ago
When I realised I had forgotten the bitlocker password on an old Windows disk I did not throw it away, but kept it, knowing this day would come.
jefffosterover 4 years ago
Reminds me of how hard it is to write a screensaver by jwz <a href="https:&#x2F;&#x2F;www.jwz.org&#x2F;blog&#x2F;2015&#x2F;04&#x2F;i-told-you-so-again&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.jwz.org&#x2F;blog&#x2F;2015&#x2F;04&#x2F;i-told-you-so-again&#x2F;</a> (and follow the links)
评论 #25811773 未加载
评论 #25811574 未加载
whatever1over 4 years ago
There are so many gotchas in computer security. Isn&#x27;t there a way to verify that a simple algorithm can have only prespecified valid final states (aka {authenticated &amp;&amp; allowed login}, {not authenticated &amp;&amp; disallowed login})?
评论 #25812244 未加载
austincheneyover 4 years ago
I have only encountered BitLocker on military computers. There BitLocker login occurs before Windows boots, like at the BIOS key entry, and has no options for forgot password.
评论 #25821557 未加载
lrossiover 4 years ago
I thought this was supposed to encrypt the drive? How can you bypass the lockscreen without having the password? Is the encryption theater?
评论 #25811264 未加载
评论 #25811250 未加载
adzmover 4 years ago
&gt; If the application has a manifest, then any .local files are ignored.<p>I suppose this does not hold true for the .local folder named that, apparently? I had not seen it documented before that it looks in that specially crafted dll subfolder (presumably using information from the manifest) to load a dll that is specified in one.
评论 #25816259 未加载
resynth1943over 4 years ago
Perfect use-case for Narrator ;-)
paulpauperover 4 years ago
this probably means governments , hackers, etc know many other bypasses
TACIXATover 4 years ago
This is not the bitlocker bios pin entry lock screen. That&#x27;s what I was imagining from the title.
arkanciscanover 4 years ago
Who leaves sticky keys on?
评论 #25815791 未加载