Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. So I’ve just had a quick play with this and yes, it works.

So I’ve just had a quick play with this and yes, it works.

Scheduled Pinned Locked Moved Uncategorized
58 Posts 38 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

    For anybody looking at this, testing showed two things:

    - TPM unlocked the storage
    - it provides a login bypass, as you’re dumped as SYSTEM prior to Windows Hello or password login

    BitLocker operates without a PIN by default so it’s basically a big gap, it’s unclear how this code made it into the production version of Windows.

    jernej__s@infosec.exchangeJ This user is from outside of this forum
    jernej__s@infosec.exchangeJ This user is from outside of this forum
    jernej__s@infosec.exchange
    wrote last edited by
    #46

    @GossiTheDog

    • it provides a login bypass, as you’re dumped as SYSTEM prior to Windows Hello or password login

    Technically you're running in WinPE with unlocked 😄 drive.

    1 Reply Last reply
    0
    • berglerma@mastodon.socialB berglerma@mastodon.social

      @gsuberland @mkoek @GossiTheDog Unless Microsoft made another mistake this shouldn't be possible. Accessing disk encryption keys should always use what is called a "salted session", where the communication between TPM and application is encrypted, precisely to prevent passive attacks on the bus.

      pianosaurus@c.imP This user is from outside of this forum
      pianosaurus@c.imP This user is from outside of this forum
      pianosaurus@c.im
      wrote last edited by
      #47

      @berglerma @gsuberland @mkoek @GossiTheDog This is BitLocker we are talking about. There's about one yearly post somewhere online, from someone new who bypassed bitlocker with an arduino and two paperclips. It's always passive attacks on the bus.

      1 Reply Last reply
      0
      • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

        For anybody looking at this, testing showed two things:

        - TPM unlocked the storage
        - it provides a login bypass, as you’re dumped as SYSTEM prior to Windows Hello or password login

        BitLocker operates without a PIN by default so it’s basically a big gap, it’s unclear how this code made it into the production version of Windows.

        mikesiegel@infosec.exchangeM This user is from outside of this forum
        mikesiegel@infosec.exchangeM This user is from outside of this forum
        mikesiegel@infosec.exchange
        wrote last edited by
        #48

        @GossiTheDog

        Link Preview Image
        mikesiegel@infosec.exchangeM 1 Reply Last reply
        0
        • mikesiegel@infosec.exchangeM mikesiegel@infosec.exchange

          @GossiTheDog

          Link Preview Image
          mikesiegel@infosec.exchangeM This user is from outside of this forum
          mikesiegel@infosec.exchangeM This user is from outside of this forum
          mikesiegel@infosec.exchange
          wrote last edited by
          #49

          @GossiTheDog I mean they already do key escrow if you link to a MSFT account right? So seems sloppy for an intentional backdoor.

          1 Reply Last reply
          0
          • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

            I should point out I’ve only tested with one version of Windows 11 - maybe the scope is smaller.

            mdb@newsie.socialM This user is from outside of this forum
            mdb@newsie.socialM This user is from outside of this forum
            mdb@newsie.social
            wrote last edited by
            #50

            @GossiTheDog Very interesting indeed. I only have a work laptop with windows 11 so I have no testbed. Everything else is Linux, and famliy has Macbooks. I use to be able to boot Linux from a portable ssd drive + portable hard drive on my work laptop to make a compressed backup of the entire laptop SSD, so I could just roll back to last working image. Could this exploit be used to perform some "essentials" backup that could be used to restore from a bitlocker lockout or other failures?

            1 Reply Last reply
            0
            • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

              So I’ve just had a quick play with this and yes, it works. Essentially BitLocker has a backdoor. https://github.com/Nightmare-Eclipse/YellowKey

              Mitigation = BitLocker PIN and BIOS password lock.

              jja2000@ue.oiaa.aaio.euJ This user is from outside of this forum
              jja2000@ue.oiaa.aaio.euJ This user is from outside of this forum
              jja2000@ue.oiaa.aaio.eu
              wrote last edited by
              #51
              @GossiTheDog You've probably seen this, but there were a bunch more in WinRE: https://media.ccc.de/v/39c3-bitunlocker-leveraging-windows-recovery-to-extract-bitlocker-secrets
              1 Reply Last reply
              0
              • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                I should point out I’ve only tested with one version of Windows 11 - maybe the scope is smaller.

                gossithedog@cyberplace.socialG This user is from outside of this forum
                gossithedog@cyberplace.socialG This user is from outside of this forum
                gossithedog@cyberplace.social
                wrote last edited by
                #52

                Me and @wdormann have both recreated the BitLocker backdoor^H^H^Hvulnerability https://www.bleepingcomputer.com/news/security/windows-bitlocker-zero-day-gives-access-to-protected-drives-poc-released/

                wdormann@infosec.exchangeW 1 Reply Last reply
                0
                • gsuberland@chaos.socialG gsuberland@chaos.social

                  @GossiTheDog it's not clear to me what config this bypasses. is it only the no password config?

                  (Edit: thought about it and yeah ofc it's just that config)

                  ams@infosec.exchangeA This user is from outside of this forum
                  ams@infosec.exchangeA This user is from outside of this forum
                  ams@infosec.exchange
                  wrote last edited by
                  #53

                  @gsuberland @GossiTheDog Slightly easier than grabbing the key off LPC I guess.

                  1 Reply Last reply
                  0
                  • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                    So I’ve just had a quick play with this and yes, it works. Essentially BitLocker has a backdoor. https://github.com/Nightmare-Eclipse/YellowKey

                    Mitigation = BitLocker PIN and BIOS password lock.

                    daigle@mastodon.kaisev.netD This user is from outside of this forum
                    daigle@mastodon.kaisev.netD This user is from outside of this forum
                    daigle@mastodon.kaisev.net
                    wrote last edited by
                    #54

                    @GossiTheDog This doesn't work for me. I'm using an exFat Ventoy USB (it's all I have right now) on a T16 Gen 1 and a desktop. Both with TPM, no PIN.

                    ThinkPad - won't boot with CTRL held down, I briefly release it on the Lenovo screen. CMD pops up but C:\ is mapped to a Ventoy partition and the BitLocker partition wasn't mounted or unlocked.

                    Desktop - I got to CMD and C:\ was mounted but locked.

                    Without the USB CMD doesn't open on either PC. I might try again later with clean NTFS USB stick.

                    daigle@mastodon.kaisev.netD 1 Reply Last reply
                    0
                    • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                      I think my prior toot on NightmareEclipse auto deleted so to make a perm one - it isn’t me. I suspect it’s somebody who used to work at MSFT, who departed after my era.

                      alesandroortiz@infosec.exchangeA This user is from outside of this forum
                      alesandroortiz@infosec.exchangeA This user is from outside of this forum
                      alesandroortiz@infosec.exchange
                      wrote last edited by
                      #55

                      @GossiTheDog Do you think U.S. authorities could be investigating NightmareEclipse due to their disclosures?

                      I imagine Microsoft is investigating internally to determine if it's someone with previous/current access to internal info that is still legally protected (by contract or law).

                      Based on their posts, MS might already know their identity if they have interacted with this person via MSRC and have their payment info for the bug bounty programs.

                      1 Reply Last reply
                      0
                      • daigle@mastodon.kaisev.netD daigle@mastodon.kaisev.net

                        @GossiTheDog This doesn't work for me. I'm using an exFat Ventoy USB (it's all I have right now) on a T16 Gen 1 and a desktop. Both with TPM, no PIN.

                        ThinkPad - won't boot with CTRL held down, I briefly release it on the Lenovo screen. CMD pops up but C:\ is mapped to a Ventoy partition and the BitLocker partition wasn't mounted or unlocked.

                        Desktop - I got to CMD and C:\ was mounted but locked.

                        Without the USB CMD doesn't open on either PC. I might try again later with clean NTFS USB stick.

                        daigle@mastodon.kaisev.netD This user is from outside of this forum
                        daigle@mastodon.kaisev.netD This user is from outside of this forum
                        daigle@mastodon.kaisev.net
                        wrote last edited by
                        #56

                        @GossiTheDog Okay I got it working on the desktop, even though `reagentc /info` showed that it was enabled, running `reagentc /disable` then `reagentc /enable` made the machine vulnerable

                        1 Reply Last reply
                        0
                        • gsuberland@chaos.socialG gsuberland@chaos.social

                          @GossiTheDog it's not clear to me what config this bypasses. is it only the no password config?

                          (Edit: thought about it and yeah ofc it's just that config)

                          sassdawe@infosec.exchangeS This user is from outside of this forum
                          sassdawe@infosec.exchangeS This user is from outside of this forum
                          sassdawe@infosec.exchange
                          wrote last edited by
                          #57

                          @gsuberland @GossiTheDog I think I used something like this last year. After a bios update a new Windows update fucked up my OS and the machine kept rebooting and going into recovery...

                          From that recovery mode I had access to the unlocked OS disk (without using the recovery key) and I was able to copy the couple of folders which were not in my backup... before I wiped the disk and did a clean install.

                          1 Reply Last reply
                          0
                          • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                            Me and @wdormann have both recreated the BitLocker backdoor^H^H^Hvulnerability https://www.bleepingcomputer.com/news/security/windows-bitlocker-zero-day-gives-access-to-protected-drives-poc-released/

                            wdormann@infosec.exchangeW This user is from outside of this forum
                            wdormann@infosec.exchangeW This user is from outside of this forum
                            wdormann@infosec.exchange
                            wrote last edited by
                            #58

                            @GossiTheDog
                            The aurhor claims that TPM + PIN is not protection.

                            Personally I have a hard time understanding how that could be bypassed. Thoughts?

                            1 Reply Last reply
                            0
                            Reply
                            • Reply as topic
                            Log in to reply
                            • Oldest to Newest
                            • Newest to Oldest
                            • Most Votes


                            • Login

                            • Login or register to search.
                            • First post
                              Last post
                            0
                            • Categories
                            • Recent
                            • Tags
                            • Popular
                            • World
                            • Users
                            • Groups