Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. So I’ve just had a quick play with this and yes, it works.

So I’ve just had a quick play with this and yes, it works.

Scheduled Pinned Locked Moved Uncategorized
58 Posts 38 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • gsuberland@chaos.socialG gsuberland@chaos.social

    @mkoek @GossiTheDog you can also usually get the same general result in this config by poking the motherboard with a logic analyser and dumping the TPM data off the bus.

    berglerma@mastodon.socialB This user is from outside of this forum
    berglerma@mastodon.socialB This user is from outside of this forum
    berglerma@mastodon.social
    wrote last edited by
    #34

    @gsuberland @mkoek @GossiTheDog Unless Microsoft made another mistake this shouldn't be possible. Accessing disk encryption keys should always use what is called a "salted session", where the communication between TPM and application is encrypted, precisely to prevent passive attacks on the bus.

    pianosaurus@c.imP 1 Reply Last reply
    0
    • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

      So I’ve just had a quick play with this and yes, it works. Essentially BitLocker has a backdoor. https://github.com/Nightmare-Eclipse/YellowKey

      Mitigation = BitLocker PIN and BIOS password lock.

      s1m@infosec.exchangeS This user is from outside of this forum
      s1m@infosec.exchangeS This user is from outside of this forum
      s1m@infosec.exchange
      wrote last edited by
      #35

      @GossiTheDog

      @drm Plus besoin de s'embêter à faire du TPM sniffing

      drm@mastodon.socialD 1 Reply Last reply
      0
      • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

        So I’ve just had a quick play with this and yes, it works. Essentially BitLocker has a backdoor. https://github.com/Nightmare-Eclipse/YellowKey

        Mitigation = BitLocker PIN and BIOS password lock.

        splinux@mastodon.unoS This user is from outside of this forum
        splinux@mastodon.unoS This user is from outside of this forum
        splinux@mastodon.uno
        wrote last edited by
        #36

        @GossiTheDog thanks God i can recover an Old ssd whose bitlocker key is somewhere in the short-circuited mainboard Something Something Secure Module and I happen to not have a backup of that specific bitlocker key

        kboyd@phpc.socialK 1 Reply Last reply
        0
        • s1m@infosec.exchangeS s1m@infosec.exchange

          @GossiTheDog

          @drm Plus besoin de s'embêter à faire du TPM sniffing

          drm@mastodon.socialD This user is from outside of this forum
          drm@mastodon.socialD This user is from outside of this forum
          drm@mastodon.social
          wrote last edited by
          #37

          @S1m @GossiTheDog testé hier par un collègue, ça marche bien ! Mais ça va être rapidement patché... 😭

          s1m@infosec.exchangeS 1 Reply Last reply
          0
          • drm@mastodon.socialD drm@mastodon.social

            @S1m @GossiTheDog testé hier par un collègue, ça marche bien ! Mais ça va être rapidement patché... 😭

            s1m@infosec.exchangeS This user is from outside of this forum
            s1m@infosec.exchangeS This user is from outside of this forum
            s1m@infosec.exchange
            wrote last edited by
            #38

            @drm @GossiTheDog Toujours à la pointe les collègues. C'est pas un patch qui nécessite une mise à jour des certifs secureboot ça ? Le genre de mise à jour qui est toujours retardée

            drm@mastodon.socialD 1 Reply Last reply
            0
            • s1m@infosec.exchangeS s1m@infosec.exchange

              @drm @GossiTheDog Toujours à la pointe les collègues. C'est pas un patch qui nécessite une mise à jour des certifs secureboot ça ? Le genre de mise à jour qui est toujours retardée

              drm@mastodon.socialD This user is from outside of this forum
              drm@mastodon.socialD This user is from outside of this forum
              drm@mastodon.social
              wrote last edited by
              #39

              @S1m @GossiTheDog 💪🏼. Je crois que tu confonds avec cette vuln https://github.com/garatc/BitUnlocker

              s1m@infosec.exchangeS 1 Reply Last reply
              0
              • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                So I’ve just had a quick play with this and yes, it works. Essentially BitLocker has a backdoor. https://github.com/Nightmare-Eclipse/YellowKey

                Mitigation = BitLocker PIN and BIOS password lock.

                moelassus@mastodon.socialM This user is from outside of this forum
                moelassus@mastodon.socialM This user is from outside of this forum
                moelassus@mastodon.social
                wrote last edited by
                #40

                @GossiTheDog I suspect you have that NSA key set. 😉

                1 Reply Last reply
                0
                • drm@mastodon.socialD drm@mastodon.social

                  @S1m @GossiTheDog 💪🏼. Je crois que tu confonds avec cette vuln https://github.com/garatc/BitUnlocker

                  s1m@infosec.exchangeS This user is from outside of this forum
                  s1m@infosec.exchangeS This user is from outside of this forum
                  s1m@infosec.exchange
                  wrote last edited by
                  #41

                  @drm @GossiTheDog Ah bah j'ai toujours cru que Bitlocker était by-design vuln aux downgrade attacks

                  1 Reply Last reply
                  0
                  • prsfalken@mastodon.socialP prsfalken@mastodon.social

                    @barubary @GossiTheDog It might be a "We've to deliver this and test this quicker" and someone forgot to remove.

                    A backdoor implies planning and we're talking about Microsoft.

                    I'd bet for bad QA and controls and lazy development with a pinch of "hurry, deliver now"

                    Which is ... Worse?

                    can@haz.pinkC This user is from outside of this forum
                    can@haz.pinkC This user is from outside of this forum
                    can@haz.pink
                    wrote last edited by
                    #42

                    @prsfalken @barubary @GossiTheDog they’re excellent at planning Copilot and spyware integrations, though.

                    1 Reply Last reply
                    0
                    • splinux@mastodon.unoS splinux@mastodon.uno

                      @GossiTheDog thanks God i can recover an Old ssd whose bitlocker key is somewhere in the short-circuited mainboard Something Something Secure Module and I happen to not have a backup of that specific bitlocker key

                      kboyd@phpc.socialK This user is from outside of this forum
                      kboyd@phpc.socialK This user is from outside of this forum
                      kboyd@phpc.social
                      wrote last edited by
                      #43

                      @splinux @GossiTheDog my mom sent me an old ssd in the same situation. Haven't been able to recover her data from it so far. 😞

                      1 Reply Last reply
                      0
                      • gsuberland@chaos.socialG gsuberland@chaos.social

                        @mkoek @GossiTheDog you can also usually get the same general result in this config by poking the motherboard with a logic analyser and dumping the TPM data off the bus.

                        rairii@labyrinth.zoneR This user is from outside of this forum
                        rairii@labyrinth.zoneR This user is from outside of this forum
                        rairii@labyrinth.zone
                        wrote last edited by
                        #44
                        @gsuberland @mkoek @GossiTheDog not always - this wouldn't work with a "firmware TPM" implementation in IntelME/AMD PSP or in Pluton for example
                        gsuberland@chaos.socialG 1 Reply Last reply
                        0
                        • rairii@labyrinth.zoneR rairii@labyrinth.zone
                          @gsuberland @mkoek @GossiTheDog not always - this wouldn't work with a "firmware TPM" implementation in IntelME/AMD PSP or in Pluton for example
                          gsuberland@chaos.socialG This user is from outside of this forum
                          gsuberland@chaos.socialG This user is from outside of this forum
                          gsuberland@chaos.social
                          wrote last edited by
                          #45

                          @Rairii @GossiTheDog @mkoek yeah, I was just thinking "hm I should edit that post from yesterday to mention fTPMs"

                          1 Reply Last reply
                          0
                          • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                            For anybody looking at this, testing showed two things:

                            - TPM unlocked the storage
                            - it provides a login bypass, as you’re dumped as SYSTEM prior to Windows Hello or password login

                            BitLocker operates without a PIN by default so it’s basically a big gap, it’s unclear how this code made it into the production version of Windows.

                            jernej__s@infosec.exchangeJ This user is from outside of this forum
                            jernej__s@infosec.exchangeJ This user is from outside of this forum
                            jernej__s@infosec.exchange
                            wrote last edited by
                            #46

                            @GossiTheDog

                            • it provides a login bypass, as you’re dumped as SYSTEM prior to Windows Hello or password login

                            Technically you're running in WinPE with unlocked 😄 drive.

                            1 Reply Last reply
                            0
                            • berglerma@mastodon.socialB berglerma@mastodon.social

                              @gsuberland @mkoek @GossiTheDog Unless Microsoft made another mistake this shouldn't be possible. Accessing disk encryption keys should always use what is called a "salted session", where the communication between TPM and application is encrypted, precisely to prevent passive attacks on the bus.

                              pianosaurus@c.imP This user is from outside of this forum
                              pianosaurus@c.imP This user is from outside of this forum
                              pianosaurus@c.im
                              wrote last edited by
                              #47

                              @berglerma @gsuberland @mkoek @GossiTheDog This is BitLocker we are talking about. There's about one yearly post somewhere online, from someone new who bypassed bitlocker with an arduino and two paperclips. It's always passive attacks on the bus.

                              1 Reply Last reply
                              0
                              • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                                For anybody looking at this, testing showed two things:

                                - TPM unlocked the storage
                                - it provides a login bypass, as you’re dumped as SYSTEM prior to Windows Hello or password login

                                BitLocker operates without a PIN by default so it’s basically a big gap, it’s unclear how this code made it into the production version of Windows.

                                mikesiegel@infosec.exchangeM This user is from outside of this forum
                                mikesiegel@infosec.exchangeM This user is from outside of this forum
                                mikesiegel@infosec.exchange
                                wrote last edited by
                                #48

                                @GossiTheDog

                                Link Preview Image
                                mikesiegel@infosec.exchangeM 1 Reply Last reply
                                0
                                • mikesiegel@infosec.exchangeM mikesiegel@infosec.exchange

                                  @GossiTheDog

                                  Link Preview Image
                                  mikesiegel@infosec.exchangeM This user is from outside of this forum
                                  mikesiegel@infosec.exchangeM This user is from outside of this forum
                                  mikesiegel@infosec.exchange
                                  wrote last edited by
                                  #49

                                  @GossiTheDog I mean they already do key escrow if you link to a MSFT account right? So seems sloppy for an intentional backdoor.

                                  1 Reply Last reply
                                  0
                                  • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                                    I should point out I’ve only tested with one version of Windows 11 - maybe the scope is smaller.

                                    mdb@newsie.socialM This user is from outside of this forum
                                    mdb@newsie.socialM This user is from outside of this forum
                                    mdb@newsie.social
                                    wrote last edited by
                                    #50

                                    @GossiTheDog Very interesting indeed. I only have a work laptop with windows 11 so I have no testbed. Everything else is Linux, and famliy has Macbooks. I use to be able to boot Linux from a portable ssd drive + portable hard drive on my work laptop to make a compressed backup of the entire laptop SSD, so I could just roll back to last working image. Could this exploit be used to perform some "essentials" backup that could be used to restore from a bitlocker lockout or other failures?

                                    1 Reply Last reply
                                    0
                                    • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                                      So I’ve just had a quick play with this and yes, it works. Essentially BitLocker has a backdoor. https://github.com/Nightmare-Eclipse/YellowKey

                                      Mitigation = BitLocker PIN and BIOS password lock.

                                      jja2000@ue.oiaa.aaio.euJ This user is from outside of this forum
                                      jja2000@ue.oiaa.aaio.euJ This user is from outside of this forum
                                      jja2000@ue.oiaa.aaio.eu
                                      wrote last edited by
                                      #51
                                      @GossiTheDog You've probably seen this, but there were a bunch more in WinRE: https://media.ccc.de/v/39c3-bitunlocker-leveraging-windows-recovery-to-extract-bitlocker-secrets
                                      1 Reply Last reply
                                      0
                                      • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                                        I should point out I’ve only tested with one version of Windows 11 - maybe the scope is smaller.

                                        gossithedog@cyberplace.socialG This user is from outside of this forum
                                        gossithedog@cyberplace.socialG This user is from outside of this forum
                                        gossithedog@cyberplace.social
                                        wrote last edited by
                                        #52

                                        Me and @wdormann have both recreated the BitLocker backdoor^H^H^Hvulnerability https://www.bleepingcomputer.com/news/security/windows-bitlocker-zero-day-gives-access-to-protected-drives-poc-released/

                                        wdormann@infosec.exchangeW 1 Reply Last reply
                                        0
                                        • gsuberland@chaos.socialG gsuberland@chaos.social

                                          @GossiTheDog it's not clear to me what config this bypasses. is it only the no password config?

                                          (Edit: thought about it and yeah ofc it's just that config)

                                          ams@infosec.exchangeA This user is from outside of this forum
                                          ams@infosec.exchangeA This user is from outside of this forum
                                          ams@infosec.exchange
                                          wrote last edited by
                                          #53

                                          @gsuberland @GossiTheDog Slightly easier than grabbing the key off LPC I guess.

                                          1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups