TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Dumping Memory to Bypass BitLocker on Windows 11

310 pointsby supermatou5 months ago

21 comments

jansommer5 months ago
I think you get the biggest advantage from BitLocker when you use TPM (PCR 7+11) with a PIN. That should mitigate the exploit because the FVEK should never be read without the PIN, and if BitLocker does it right (which I think it does) too many wrong PIN&#x27;s results in the TPM going into dictionary attack lockout mode.<p>Now I&#x27;ve been trying for months to do the same for Linux. There&#x27;s systemd-cryptsetup&#x2F;cryptenroll, but it&#x27;s only for LUKS and I&#x27;m trying to encrypt a few sensitive directories on a super slow internal eMMC with fscrypt (keys for secure boot and &#x2F;home). The TPM is _EXTREMELY_ hard to code for when things go beyond the basics:<p>1. Bind to PCR 7<p>2. Bind to changing PCR 11 (changes whenever the kernel, init, cmdline etc. is updated)<p>3. Use a PIN - but not the AuthValue, because I want to use the same authorization policy for resetting the DA lockout counter on login, and also have a long password&#x2F;AuthValue for resetting the counter manually.<p>4. Make it all work with PCR 11 signatures and public keys provided by systemd-stub.<p>Maybe this isn&#x27;t the right place to ask, but there&#x27;s almost nothing but basic TPM guides out there, so if you&#x27;re an expert I could really use your help. It&#x27;s just for a personal project, but I&#x27;ll write about it once I&#x27;m done - if I ever figure it out!
评论 #42557832 未加载
评论 #42553619 未加载
评论 #42557556 未加载
评论 #42558484 未加载
评论 #42553363 未加载
评论 #42554157 未加载
jandrese5 months ago
Fundamentally I don&#x27;t understand BitLocker&#x27;s security model. In most installs it seems like you power on the machine by pressing the power button and it boots into Windows.<p>So if someone steals you machine with an encrypted hard drive they need to...just turn it on? That can&#x27;t be right, but at the same time I have no idea how this particular attack is defeated. I have to assume the traffic over the SPI bus is encrypted so the key can&#x27;t just be dumped like that, but it seems like the machine is going to give up the key pretty easily regardless.<p>With LUKS it at least has a password prompt to unlock the drive.
评论 #42552955 未加载
评论 #42553629 未加载
评论 #42552956 未加载
评论 #42553031 未加载
评论 #42553040 未加载
评论 #42553229 未加载
评论 #42554930 未加载
评论 #42555327 未加载
评论 #42560181 未加载
评论 #42557760 未加载
mjg595 months ago
This is entirely defeated by <a href="https:&#x2F;&#x2F;trustedcomputinggroup.org&#x2F;resource&#x2F;pc-client-work-group-platform-reset-attack-mitigation-specification&#x2F;" rel="nofollow">https:&#x2F;&#x2F;trustedcomputinggroup.org&#x2F;resource&#x2F;pc-client-work-gr...</a> - if enabled, if the OS isn&#x27;t cleanly shut down (giving it an opportunity to wipe encryption keys) the firmware will pause to wipe RAM before booting anything else on next boot. Does Windows not make use of this, or did the tested system not implement it?
评论 #42552977 未加载
评论 #42553622 未加载
评论 #42552785 未加载
NoInitRD5 months ago
Hello everybody, I&#x27;m the author of the article. If you have any questions, please feel free to message me on this account. I had a lot of fun working on this and I really appreciate all of the engagement.
评论 #42555006 未加载
PhilippGille5 months ago
Related 38C3 talk about Windows 11 BitLocker bypass: <a href="https:&#x2F;&#x2F;media.ccc.de&#x2F;v&#x2F;38c3-windows-bitlocker-screwed-without-a-screwdriver" rel="nofollow">https:&#x2F;&#x2F;media.ccc.de&#x2F;v&#x2F;38c3-windows-bitlocker-screwed-withou...</a>
layer85 months ago
It’s fairly well known that BitLocker only really protects a computer that is turned off, and also only if you configure BitLocker to require a boot password [0].<p>[0] <a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;BitLocker#TPM_alone_is_not_enough" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;BitLocker#TPM_alone_is_not_eno...</a>
RachelF5 months ago
Windows has a proposed memory encryption option along with memory compression.<p>Both Intel and AMD are working on embedding this into their CPUs.<p>However, the target use appears to be servers with multiple VMs, not laptops.
评论 #42555020 未加载
评论 #42554434 未加载
0xml5 months ago
Related: Bypassing Bitlocker using a cheap logic analyzer on a Lenovo laptop <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=37249623">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=37249623</a>
ivraatiems5 months ago
For any exploit which relies on reading a dump of the target machine&#x27;s memory, if you have physical access to said machine: How feasible is an &quot;interposer&quot; device that copies off or modifies data as it goes in and out of RAM?<p>I&#x27;m thinking of something like the old &quot;Action Replay&quot; devices for Gameboys, which modified memory from the game cartridge as it went into the system to be loaded (or executed in the case of code) in order to cheat in games. You slotted the cartridge into the Action Replay, then slotted the Action Replay into the Gameboy.<p>Could you do something similar between the RAM and the motherboard? Slot your ram into the device, slot the device into the motherboard, and capture the state of memory at any moment by simply watching how memory is read&#x2F;written? That way, you&#x27;d save yourself the hassle of manually powering off the machine and hoping the data you need is available?<p>I&#x27;m not an electrical engineer so maybe what I am proposing is completely infeasible - physical space and bandwidth limitations certainly seem likely. But is it possible?
评论 #42557302 未加载
评论 #42557776 未加载
dist-epoch5 months ago
Few know this, but Intel&#x2F;AMD CPUs released in the last few years support transparent full memory encryption, where the RAM content is encrypted with a random key kept in the CPU memory controller and generated at reset.<p>It&#x27;s typically disabled in BIOS, since it has a small memory performance penalty (0.1%-&gt;1%)<p>But it would completely prevent this attack.
评论 #42560702 未加载
ibbtown5 months ago
Having a surface 5 pro laying around here, with a bitlocker encrypted disk, which turns quickly into a BSOD during boot. Do you think it could work in auch situation? I&#x27;m still waiting for an exploit to the tom to extract some pictures from the disk
评论 #42560092 未加载
shortsunblack5 months ago
See the talk &quot;Recent TPM Security Enhancements to the Linux Kernel&quot; by a Microsoft engineer (I find this ironic) for recent Linux TPM security enhancements. New features add some transport security.<p><a href="https:&#x2F;&#x2F;youtu.be&#x2F;WK7NERQXh4I" rel="nofollow">https:&#x2F;&#x2F;youtu.be&#x2F;WK7NERQXh4I</a>
medlazik5 months ago
Step 3: Boot from the USB Device<p>Game over, any laptop with data worth stealing will have this disabled in bios
评论 #42565213 未加载
jpalomaki5 months ago
You can make things a bit harder by locking the boot order in bios and password protecting the bios settings.<p>Not sure how much this helps against a determined attacker, but it&#x27;s easy and inconvenience is minimal in most cases.
slicktux5 months ago
Why are more people not using self encrypting drives?
评论 #42553415 未加载
评论 #42553603 未加载
评论 #42553607 未加载
3eb7988a16635 months ago
What was the hardware on which this was running? I thought DDR5 would be more resistant to this type of RAM attack.
评论 #42552668 未加载
wh_1235 months ago
Reminds me the cold boot attack....
EVa5I7bHFq9mnYK5 months ago
Why bitlocker specifically? Will GPG encryption survive if an attacker can dump the RAM at any moment while it encrypts a file?
devops995 months ago
This is exactly why there are some more &quot;enterprise&quot; machines out there that an arbitrary adversary with physical access can not &quot;abruptly restart&quot; from the outside.<p>It&#x27;s a shame that popularly used OEMs still allow &quot;abrupt restart&quot; to be so easy.
maxo1335 months ago
Too bad the author did not provide hardware specs. Such attack is even harder on DDR4 and DDR5 memory and most publications refer to legacy ram such as DDR3<p>&gt; In my experience I have had the most success restarting the system while Windows is loading but before the login screen has appeared, at least in the case of finding FVEK keys.<p>So what is this? It was supposed to be memory attack and he&#x27;s dumping the keys after someone unlocked it and it&#x27;s booting?<p>So this is just another theoretical attack where perfect conditions must be met.
评论 #42553012 未加载
评论 #42554061 未加载
评论 #42554660 未加载
tnetenbaa5 months ago
BitLocker is crazy easy to bypass if you have physical access to the device. I work IT, and had to demonstrate to our head of security, that if you just pop in a Linux USB and boot from it, the drive is completely open.
评论 #42552528 未加载
评论 #42552504 未加载
评论 #42553285 未加载
评论 #42552520 未加载