Bypassing Local Windows Authentication To Defeat Full Disk Encryption

แชร์
ฝัง
  • เผยแพร่เมื่อ 21 ส.ค. 2024

ความคิดเห็น • 34

  • @sent4dc
    @sent4dc 6 ปีที่แล้ว +19

    OK. Mislabeled video. This is not really a BitLocker encryption bypass. It's a domain authentication attack. Obviously, if you're doing full disk encryption on your own laptop DO NOT use TPM. I know it's convenient but it's also worthless. Instead, get yourself a small USB stick and use it for pre-boot authentication with BitLocker. You can keep it on your keychain along with your house or car key. You will need that USB stick only to boot your computer. Then as soon as it boots you'll get that USB stick out. Works really well and is also much, much more secure than TPM. (And if you lose your laptop the chances are that you will keep your keys on your person, so whoever finds your laptop will not be able to read your hard drive.)

    • @zezo782
      @zezo782 6 ปีที่แล้ว

      What if the person who got access to ma laptop removed the drive from the laptop, will they still be unable to access it?

    • @kirbfx
      @kirbfx 5 ปีที่แล้ว +2

      What is TPM??

    • @levilima9925
      @levilima9925 5 ปีที่แล้ว +2

      @@kirbfx TPM is a hardware chip component that's responsible for communicating with your operating system regarding the authentication of your key-cryption. Sort of.
      More information here: whatis.techtarget.com/definition/trusted-platform-module-TPM

    • @levilima9925
      @levilima9925 5 ปีที่แล้ว +1

      You're correct. I thought this guy was some kind of genius for bypassing the BitLocker feature encryption but he used social engineering at the end to gain access to the computer which is not bypassing the encryption scheme.

    • @QuickishFM
      @QuickishFM 4 ปีที่แล้ว +1

      Also if the TPM gets erased and you don't have the recovery key then you can't get back in

  • @ali.kamran7112
    @ali.kamran7112 4 ปีที่แล้ว

    Very nice brother, keep it up...👍👍👍

  • @Dluzak1
    @Dluzak1 5 ปีที่แล้ว +2

    Why people keep using very light colors on white background... The arrows at 6:51 are pretty much invisible, so the slide is becoming useless.

    • @Jeff-vm4gp
      @Jeff-vm4gp 5 ปีที่แล้ว

      you'd figure in this case standard would be Green on Black

  • @MadsHegelund
    @MadsHegelund 8 ปีที่แล้ว

    Nice one..

  • @WizardNumberNext
    @WizardNumberNext 4 ปีที่แล้ว

    there is no physically going to datacentre to reboot machine or enter pin
    this is what IPMI is for
    if you have 'same as physical access' while being remote, even thousands of miles away, then you do not need to type anything on keyboard, which is NOT connected to server anyway (why would you even consider connecting keyboard or monitor to server?)
    P.S. if you can afford server and cannot afford IPMI, then I am lost

  • @burtonh1
    @burtonh1 7 ปีที่แล้ว

    How does one set up their computer to defend against such attacks?

  • @HardTrancid
    @HardTrancid 3 ปีที่แล้ว +1

    When I attack a Bitlocker locked HDD I image it RAW then run a brute force on the hash ...

    • @FSA2023
      @FSA2023 2 ปีที่แล้ว +1

      can you do it online for someone?

    • @HardTrancid
      @HardTrancid 2 ปีที่แล้ว

      @@FSA2023 I might do a video down the road. We'll see I suppose.

    • @sahmed868
      @sahmed868 2 ปีที่แล้ว

      @@HardTrancid can you do this for my laptop?

  • @TheAmazeer
    @TheAmazeer 6 ปีที่แล้ว

    first you need a laptop with a ubuntu or debian installed then install a samba dc with the same name of the windows domain you want to attack then you put your encripted machine on the same network as the samba dc so that they can talk together then you change date and password for the account you to exploit then put the right date loggin back will prompt to you your password has expired then put a new one but before that you must disconnect network nic in order to force the computer to check its cache... Very smart .. but you didn't configure samba dc for expiry date is it set by default to password expires within a certain amount of time ?

    • @mdd1963
      @mdd1963 5 ปีที่แล้ว

      Not all switches will auto assign an IP address to new unknown hardware easily....; you might need access to the switches terminal to run bindwiper ..assuming you can even get into the switch......

  • @naziamalik8749
    @naziamalik8749 8 ปีที่แล้ว

    please help me, how can i really all black hat stuff efficiently ??

  • @Heycarlson
    @Heycarlson 4 ปีที่แล้ว

    What about from BIOS?!!?

  • @Tomyb15
    @Tomyb15 8 ปีที่แล้ว

    so, is BitLocker useless now if you didn't enable pre boot authentication?

    • @rfh1987
      @rfh1987 7 ปีที่แล้ว

      If it's a domain computer without pre boot authentication, it can be hacked this way. Also, I imagine Microsoft is actively working on correcting this attack (assuming they haven't already patched it).

    • @disk0__
      @disk0__ 7 ปีที่แล้ว +7

      at the end he literally says it was patched prior to the presentation

    • @rfh1987
      @rfh1987 7 ปีที่แล้ว

      disco__ LOL. Thanks for pointing that out. I guess the rest of us stopped the video at the Q&A part. :D

  • @quarteratom
    @quarteratom 2 ปีที่แล้ว

    LOL, don't store the encryption key inside the computer, and don't decrypt everything automatically.

  • @Spontan_DJ
    @Spontan_DJ 3 ปีที่แล้ว

    veracrypt ram encryption...

  • @naziamalik8749
    @naziamalik8749 8 ปีที่แล้ว

    how can i learn these black hat stuff from these videos ??

    • @jamesedwards3923
      @jamesedwards3923 4 ปีที่แล้ว

      There is nothing criminal about what he is teaching or doing.

  • @kdeeuk
    @kdeeuk 7 ปีที่แล้ว

    thanks for telling all the theives how to get in to my pc, good on ya why ?, this is very irresponsible of u

    • @davidreynolds9649
      @davidreynolds9649 7 ปีที่แล้ว +15

      This isn't about telling thieves how to get into your PC; they already know. It's about telling you that it's possible, so that you can react accordingly.

    • @rjstewart
      @rjstewart 6 ปีที่แล้ว +3

      If you watch the whole video you will see that prior to him releasing this exploit's details Microsoft released a patch. This is what responsible hackers do. This is what I did years ago when I found a major bug in a piece of widely used software. We contacted the vendor, waited until the fix was ready and out and THEN explained the exploit.