Bypassing Local Windows Authentication To Defeat Full Disk Encryption

Sdílet
Vložit
  • čas přidán 10. 09. 2024

Komentáře • 34

  • @sent4dc
    @sent4dc Před 6 lety +19

    OK. Mislabeled video. This is not really a BitLocker encryption bypass. It's a domain authentication attack. Obviously, if you're doing full disk encryption on your own laptop DO NOT use TPM. I know it's convenient but it's also worthless. Instead, get yourself a small USB stick and use it for pre-boot authentication with BitLocker. You can keep it on your keychain along with your house or car key. You will need that USB stick only to boot your computer. Then as soon as it boots you'll get that USB stick out. Works really well and is also much, much more secure than TPM. (And if you lose your laptop the chances are that you will keep your keys on your person, so whoever finds your laptop will not be able to read your hard drive.)

    • @zezo782
      @zezo782 Před 6 lety

      What if the person who got access to ma laptop removed the drive from the laptop, will they still be unable to access it?

    • @kirbfx
      @kirbfx Před 5 lety +2

      What is TPM??

    • @levilima9925
      @levilima9925 Před 5 lety +2

      @@kirbfx TPM is a hardware chip component that's responsible for communicating with your operating system regarding the authentication of your key-cryption. Sort of.
      More information here: whatis.techtarget.com/definition/trusted-platform-module-TPM

    • @levilima9925
      @levilima9925 Před 5 lety +1

      You're correct. I thought this guy was some kind of genius for bypassing the BitLocker feature encryption but he used social engineering at the end to gain access to the computer which is not bypassing the encryption scheme.

    • @QuickishFM
      @QuickishFM Před 4 lety +1

      Also if the TPM gets erased and you don't have the recovery key then you can't get back in

  • @Dluzak1
    @Dluzak1 Před 6 lety +2

    Why people keep using very light colors on white background... The arrows at 6:51 are pretty much invisible, so the slide is becoming useless.

    • @Jeff-vm4gp
      @Jeff-vm4gp Před 5 lety

      you'd figure in this case standard would be Green on Black

  • @ali.kamran7112
    @ali.kamran7112 Před 4 lety

    Very nice brother, keep it up...👍👍👍

  • @burtonh1
    @burtonh1 Před 7 lety

    How does one set up their computer to defend against such attacks?

  • @HardTrancid
    @HardTrancid Před 4 lety +1

    When I attack a Bitlocker locked HDD I image it RAW then run a brute force on the hash ...

    • @FSA2023
      @FSA2023 Před 2 lety +1

      can you do it online for someone?

    • @HardTrancid
      @HardTrancid Před 2 lety

      @@FSA2023 I might do a video down the road. We'll see I suppose.

    • @sahmed868
      @sahmed868 Před 2 lety

      @@HardTrancid can you do this for my laptop?

  • @WizardNumberNext
    @WizardNumberNext Před 4 lety

    there is no physically going to datacentre to reboot machine or enter pin
    this is what IPMI is for
    if you have 'same as physical access' while being remote, even thousands of miles away, then you do not need to type anything on keyboard, which is NOT connected to server anyway (why would you even consider connecting keyboard or monitor to server?)
    P.S. if you can afford server and cannot afford IPMI, then I am lost

  • @naziamalik8749
    @naziamalik8749 Před 8 lety

    please help me, how can i really all black hat stuff efficiently ??

  • @TheAmazeer
    @TheAmazeer Před 6 lety

    first you need a laptop with a ubuntu or debian installed then install a samba dc with the same name of the windows domain you want to attack then you put your encripted machine on the same network as the samba dc so that they can talk together then you change date and password for the account you to exploit then put the right date loggin back will prompt to you your password has expired then put a new one but before that you must disconnect network nic in order to force the computer to check its cache... Very smart .. but you didn't configure samba dc for expiry date is it set by default to password expires within a certain amount of time ?

    • @mdd1963
      @mdd1963 Před 5 lety

      Not all switches will auto assign an IP address to new unknown hardware easily....; you might need access to the switches terminal to run bindwiper ..assuming you can even get into the switch......

  • @Tomyb15
    @Tomyb15 Před 8 lety

    so, is BitLocker useless now if you didn't enable pre boot authentication?

    • @rfh1987
      @rfh1987 Před 8 lety

      If it's a domain computer without pre boot authentication, it can be hacked this way. Also, I imagine Microsoft is actively working on correcting this attack (assuming they haven't already patched it).

    • @disk0__
      @disk0__ Před 7 lety +7

      at the end he literally says it was patched prior to the presentation

    • @rfh1987
      @rfh1987 Před 7 lety

      disco__ LOL. Thanks for pointing that out. I guess the rest of us stopped the video at the Q&A part. :D

  • @MadsHegelund
    @MadsHegelund Před 8 lety

    Nice one..

  • @Heycarlson
    @Heycarlson Před 4 lety

    What about from BIOS?!!?

  • @quarteratom
    @quarteratom Před 2 lety

    LOL, don't store the encryption key inside the computer, and don't decrypt everything automatically.

  • @naziamalik8749
    @naziamalik8749 Před 8 lety

    how can i learn these black hat stuff from these videos ??

    • @jamesedwards3923
      @jamesedwards3923 Před 4 lety

      There is nothing criminal about what he is teaching or doing.

  • @Spontan_DJ
    @Spontan_DJ Před 3 lety

    veracrypt ram encryption...

  • @kdeeuk
    @kdeeuk Před 7 lety

    thanks for telling all the theives how to get in to my pc, good on ya why ?, this is very irresponsible of u

    • @davidreynolds9649
      @davidreynolds9649 Před 7 lety +15

      This isn't about telling thieves how to get into your PC; they already know. It's about telling you that it's possible, so that you can react accordingly.

    • @rjstewart
      @rjstewart Před 6 lety +3

      If you watch the whole video you will see that prior to him releasing this exploit's details Microsoft released a patch. This is what responsible hackers do. This is what I did years ago when I found a major bug in a piece of widely used software. We contacted the vendor, waited until the fix was ready and out and THEN explained the exploit.