TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Windows BitLocker – Screwed Without a Screwdriver

190 pointsby lima5 months ago

10 comments

wat100005 months ago
I can’t understand this design. You should derive the disk’s encryption key from the user’s login password. You have a small, secure program that presents a login screen on boot. It takes the password you input and uses it to unlock the disk. It passes the username and password along to the OS so that it can take you right into your account after it boots.<p>As long as your encryption is decent, this makes it fundamentally impossible to read the drive from a turned-off state without knowing or cracking the password.
评论 #42749363 未加载
评论 #42749627 未加载
评论 #42748913 未加载
评论 #42749200 未加载
评论 #42748921 未加载
评论 #42749670 未加载
评论 #42749004 未加载
评论 #42749156 未加载
评论 #42748981 未加载
layer85 months ago
This is all correct, but it’s been fairly well known since over 15 years ago that BitLocker only really protects a computer if you configure BitLocker to require a pre-boot password, and also only after you turned off the computer [0].<p>[0] <a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;BitLocker#TPM_alone_is_not_eno" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;BitLocker#TPM_alone_is_not_eno</a>...
评论 #42752800 未加载
yread5 months ago
&gt; Okay, so now we know how to edit a BCD file. But what do we put in there? This was the trickiest part of this exploit chain, as you get very little feedback when things go wrong. Recall the bug we are trying to reproduce: We want the bootloader to attempt to boot from our BitLocker partition, fail, and then trigger a PXE soft reboot into our controlled OS.<p>&gt; The easiest way to get this working has three parts:<p>&gt; Get the original BCD from the victim’s device. This ensures the configuration matches the specific partition GUIDs. You can do that by shift-rebooting Windows, going “Troubleshoot &gt; Advanced options &gt; Command Prompt”, mounting the boot partition, and copying its contents to a USB drive. Or, be more advanced and use an SMB mount, if you don’t have USB access.<p>Do I understand it correctly that to bypass the encryption you need access to the decrypted contents of the encrypted disk? Did the original exploit guess the layout of the partitions instead?
评论 #42752653 未加载
laurensr5 months ago
Video presentation at <a href="https:&#x2F;&#x2F;ftp.fau.de&#x2F;cdn.media.ccc.de&#x2F;congress&#x2F;2024&#x2F;h264-hd&#x2F;38c3-816-eng-Windows_BitLocker_Screwed_without_a_Screwdriver.mp4" rel="nofollow">https:&#x2F;&#x2F;ftp.fau.de&#x2F;cdn.media.ccc.de&#x2F;congress&#x2F;2024&#x2F;h264-hd&#x2F;38...</a>
kopirgan5 months ago
I had posted this question in another thread re TPM on Linux and the answer is here after a couple of days.
lostmsu5 months ago
This is easily mitigated by requiring password to change boot order.
评论 #42749873 未加载
评论 #42750760 未加载
lostmsu5 months ago
Was BIOS fully updated as well?<p>Do new devices still suffer from the issue?
评论 #42749528 未加载
varispeed5 months ago
How these work on a headless server where you cannot enter password upon boot? If someone steals the server can they read data?
评论 #42749780 未加载
评论 #42749469 未加载
antithesis-nl5 months ago
TL;DR, like all secure-boot disk-encryption outrage-bait articles of late: if you&#x27;re really concerned about any of this, set a TPM PIN and&#x2F;or explicit disk encryption password.
评论 #42749798 未加载
评论 #42749177 未加载
kylebenzle5 months ago
NSA and CIA do NOT want this info to be public. Surprised OP hasn&#x27;t gotten a call yet to shut it down...
评论 #42756814 未加载
评论 #42749228 未加载
评论 #42749340 未加载
评论 #42751810 未加载