TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Break into this CEO’s laptop to steal company secrets and plant malware

113 pointsby lhoffover 3 years ago

12 comments

mtlynchover 3 years ago
This is a little silly because this assumes that BitLocker is configured for TPM-only rather than requiring a TPM PIN&#x2F;password.<p>If there&#x27;s a TPM password, this attack becomes infeasible because the TPM won&#x27;t release the keys without the password. And you generally can&#x27;t brute force the TPM without triggering the hardware lockout.<p>The company&#x27;s IT department can require TPM+Password in Group Policy so that every system in the organization uses TPM+Password, but I guess you could have a stubborn CEO who demands a less secure policy.<p>As of Windows 8, it was possible to replace ciphertext on a BitLocker-encrypted drive to compromise known Windows binaries.[0] This would allow the attacker to take control of the system on next boot, though I don&#x27;t know if those attacks are still practical.<p>[0] <a href="https:&#x2F;&#x2F;cryptoservices.github.io&#x2F;fde&#x2F;2014&#x2F;12&#x2F;08&#x2F;code-execution-in-spite-of-bitlocker.html" rel="nofollow">https:&#x2F;&#x2F;cryptoservices.github.io&#x2F;fde&#x2F;2014&#x2F;12&#x2F;08&#x2F;code-executi...</a>
评论 #28758438 未加载
评论 #28758719 未加载
评论 #28760196 未加载
评论 #28758622 未加载
评论 #28758858 未加载
评论 #28761649 未加载
评论 #28758213 未加载
moviuroover 3 years ago
That&#x27;s why you should also consider fancy nail polish an effective canary to evil maid attacks.<p><a href="https:&#x2F;&#x2F;www.computerweekly.com&#x2F;blog&#x2F;CW-Developer-Network&#x2F;F-Secure-glams-up-laptop-security-with-glitter-nail-polish" rel="nofollow">https:&#x2F;&#x2F;www.computerweekly.com&#x2F;blog&#x2F;CW-Developer-Network&#x2F;F-S...</a>
ginkoover 3 years ago
Shouldn&#x27;t the TPM&#x2F;hard disk be password protected? What&#x27;s even the point of the TPM when you can just sniff out the key without it?
评论 #28758752 未加载
dmurrayover 3 years ago
Unrolled: <a href="https:&#x2F;&#x2F;threadreaderapp.com&#x2F;thread&#x2F;1445020885472235524.html" rel="nofollow">https:&#x2F;&#x2F;threadreaderapp.com&#x2F;thread&#x2F;1445020885472235524.html</a>
评论 #28759105 未加载
tw04over 3 years ago
It’s an interesting thought experiment but not much else. Most of what he’s doing is predicated on the idea that any major CEO is walking around with a 7 year old laptop that is both well documented online and not configured with TPM + password which pretty much any competent IT department is going to require of an executive’s device.
评论 #28761086 未加载
mid-kidover 3 years ago
I&#x27;m skeptical as to whether this can really be done in 10 mins. Finding the right chip can take a good while and especially tracing the bus you need to other chips. And the fact the traces were accessible with the thing semi-assembled is incredibly lucky, not to mention how he was able to find a &quot;schematic&quot; of the motherboard. I&#x27;d say an hour to pull this off is a minimum.
评论 #28760841 未加载
评论 #28760931 未加载
Gargyleover 3 years ago
On Dell devices in that age range I saw a bitlocker mode that used the drive controllers own encryption feature. I dont remember if the key was provided by tpm but they used attestation. I dont know if they had a key unwrap dependent on that attestation or if it was just a postfactum check that is submitted to management servers.<p>In that course I have seen a bunch of blog posts where people found bugdoors or easy auth bypasses in these drive controller encryption schemes. Is that still a thing?
评论 #28761407 未加载
martin_aover 3 years ago
What fascinates me most is how quick this can be done. If you do your &quot;homework&quot; and find out which device needs to be attacked, you can really set everything up in advance and can be done in no time. Amazing and shocking at the same time.
0xbadcafebeeover 3 years ago
Please. <i>Please.</i> Twitter people, hear my plea.<p><i>Twitter sucks ass and I don&#x27;t want to scroll for a week to read your blog post.</i> Please, <i>please</i>, just copy+paste it into a blog post and link to it on your Twitter. I swear I will &quot;like &amp; subscribe&quot; to your Blog if you&#x27;re worried about not getting enough eyeballs. I just do not want to ever have to look at Twitter.
评论 #28762322 未加载
评论 #28762314 未加载
staticassertionover 3 years ago
Ultimately I guess the best solution here is something like intel PTT where the TPM is on-chip, or otherwise some sort of soldered shared secret &#x2F; keys that the TPM and CPU have for encrypted communications over the bus.
评论 #28759501 未加载
fxtentacleover 3 years ago
TLDR: Sniff the Bitlocker secret key from the SPI bus using a logic analyzer. Then, Kali can decrypt the HDD.
wiliaonsonover 3 years ago
I do hope that it is secured enough to withstand attacks.