SlideShare a Scribd company logo
1 of 29
Download to read offline
Bypassing Local Windows
Authentication to Defeat
Full Disk Encryption
Ian Haken
Ian Haken Bypassing Local Windows Authentication to Defeat Full Disk Encryption
Who Am I?
• Currently a security researcher at Synopsys,
working on application security tools and
Coverity’s static analysis product.
• Previously received my Ph.D. in mathematics
from UC Berkeley.
• Twitter: @ianhaken
• Email: ian.haken@synopsys.com
2
Ian Haken Bypassing Local Windows Authentication to Defeat Full Disk Encryption 3
Full Disk Encryption
• A scheme for protecting data at rest. Encrypts
an entire disk or volume.
• Mitigates the impact of a threat with physical
access; generally does not provide protection
against remote adversaries.
• Encrypts everything, often including the OS.
Ian Haken Bypassing Local Windows Authentication to Defeat Full Disk Encryption 4
Microsoft BitLocker
• BitLocker is Microsoft's proprietary full-disk
encryption feature.
• Built into all professional/enterprise versions
of Windows since Vista.
• Uses the system's Trusted Platform Module
(TPM) to store the master encryption key.
Ian Haken Bypassing Local Windows Authentication to Defeat Full Disk Encryption 5
What is a TPM?
• A TPM is a hardware module responsible for
performing cryptographic operations,
performing attestation, and storing secrets.
• It has fairly general APIs, so how it is used is
mostly up to applications.
• Example applications include remote
attestation, and storing encryption keys.
Ian Haken Bypassing Local Windows Authentication to Defeat Full Disk Encryption 6
Storing Secrets on a TPM
• A TPM contains several Platform Configuration
Registers (PCRs).
• Starting with the BIOS (which is assumed to be
trusted), the next part of the boot process
(e.g. the MBR) is hashed and this value is
stored in the a PCR.
• Each stage of the boot process is responsible
for hashing the next and storing it in a PCR.
Ian Haken Bypassing Local Windows Authentication to Defeat Full Disk Encryption 7
Storing Secrets on a TPM
• A boot, the TPM has a zero in all PCR registers.
• Whenever the TPM is told to update a register
r with a value v, it always sets: r = HASH (r | v)
• So PCR values can never get set directly, only
appended to. Arbitrary PCR values cannot be
spoofed.
• This means a set of values in the PCRs can only
be replicated by having that same boot chain.
Ian Haken Bypassing Local Windows Authentication to Defeat Full Disk Encryption 8
Storing Secrets on a TPM
• When the TPM stores a secret key, that key
can be sealed. When a key is sealed, the TPM
references the current value of the PCRs.
• An API call to unseal that key will fail unless
the current PCR values match the original
values from when the key was sealed.
• So effectively, only the original boot process
will be able to retrieve that secret key.
Ian Haken Bypassing Local Windows Authentication to Defeat Full Disk Encryption 9
Transparent BitLocker
• BitLocker, in addition to the TPM, can
optionally require a PIN or a key saved on a
USB drive.
• However, it’s recommended configuration
works transparently. It seals the secret key in
the TPM and only BitLocker can retrieve it.
• Your computer boots up to a login screen as
usual, with no indication that FDE is enabled.
Ian Haken Bypassing Local Windows Authentication to Defeat Full Disk Encryption 10
BIOS/EFI
MBR and
bootloader
Operating System
(Encrypted)
RAM
Ian Haken Bypassing Local Windows Authentication to Defeat Full Disk Encryption 11
Attacks Given Physical Access
• Known Hardware Attacks
– Attack the TPM (grounding control pins)
– Do a cold-boot attack to get the key from RAM
• Attack an early part of the boot chain
– Flash the BIOS/EFI with a custom image
– Look for a defect in the BIOS, MBR, or boot loader
• Or see we can attack the OS itself and see if
Windows will give us the key...
Ian Haken Bypassing Local Windows Authentication to Defeat Full Disk Encryption 12
Booting Up With BitLocker
Ian Haken Bypassing Local Windows Authentication to Defeat Full Disk Encryption 13
Local Windows Authentication
• The Local Security Authority (LSA) manages
authentication, usually using a Security
Subsystem Provider (SSP).
• For a client-domain authentication, the
Kerberos SSP exchanges messages with the
Domain Controller (DC).
– When attacking FDE, we have physical access. So
we control the network and can run a “mock” DC.
Ian Haken Bypassing Local Windows Authentication to Defeat Full Disk Encryption 14
Windows Domain Authentication
• Requests a session ticket (TGT) from the DC.
– The TGT includes a secret key S, encrypted by the
DC with the saved user password. Login screen
decrypts S using the typed password.
1. Request TGT
2. TGT, ENC(USER_PW, S)
3. Locally verify response and decrypt S
Ian Haken Bypassing Local Windows Authentication to Defeat Full Disk Encryption 15
Windows Domain Authentication
• TGT and S are used to request a service ticket
T from the DC for the target service (in this
case, the local workstation).
– The local workstation verifies T.
4. Request for T using TGT and S
5. Responds with T
6. Locally verify T
Ian Haken Bypassing Local Windows Authentication to Defeat Full Disk Encryption 16
Machine Passwords
• When a workstation first joins a domain...
– A secret key is generated, called the machine
password.
– This password is sent to the DC, so they have a
shared secret for future communication.
• To grant access to the workstation, the login
process must present a valid service ticket T.
– This ticket is signed using the machine password.
– Which we don't have...
Ian Haken Bypassing Local Windows Authentication to Defeat Full Disk Encryption 17
If the DC uses the wrong machine password
Ian Haken Bypassing Local Windows Authentication to Defeat Full Disk Encryption 18
The Local Credentials Cache
• A user can login when the DC isn’t available
– Like when you’re using your laptop at a
conference during someone’s talk…
• The cache is usually updated whenever the
workstation sees the credentials are changed.
– So it's updated when you successfully login and
were authenticating against the DC.
– Also updated when you change your domain
password.
Ian Haken Bypassing Local Windows Authentication to Defeat Full Disk Encryption 19
Too Bad We Can't Change the
Password On the Login Screen
Ian Haken Bypassing Local Windows Authentication to Defeat Full Disk Encryption 20
Password Reset
Ian Haken Bypassing Local Windows Authentication to Defeat Full Disk Encryption 21
Poisoned Credentials Cache
Ian Haken Bypassing Local Windows Authentication to Defeat Full Disk Encryption 22
Poisoned Credentials Cache
Ian Haken Bypassing Local Windows Authentication to Defeat Full Disk Encryption 23
What Now?
• Dump the BitLocker key from kernel memory
– As long as the domain account is a local admin
– Although at this point you already have access to
all the local user files, so it's pretty moot.
• Just dig through personal data
– Saved passwords, Outlook emails, source code…
– Drop in a trojan / backdoor, or whatever other
malware you like.
Ian Haken Bypassing Local Windows Authentication to Defeat Full Disk Encryption 24
Demo
Ian Haken Bypassing Local Windows Authentication to Defeat Full Disk Encryption 25
System Configurations Effected
• Applies to any computer with:
– BitLocker without pre-boot authentication
– Attached to a domain
– With a least one person having logged in with a
domain account.
• Tested on Windows Vista, Windows 7, and
Windows 8.1, Windows 10.
– (Also Windows XP and Windows 2000)
Ian Haken Bypassing Local Windows Authentication to Defeat Full Disk Encryption 26
How Else Does This Attack Apply?
• This isn't really BitLocker specific. More
generally, this is an authentication bypass for
domain accounts.
• If someone is logged in, locks their screen, and
steps away, you could use this to unlock the
PC.
– Someone on their laptop at a coffee shop.
– A computer in an office.
Ian Haken Bypassing Local Windows Authentication to Defeat Full Disk Encryption 27
Impact and Mitigation
• This is 100% reliable attack, software-only, low
sophistication, and takes a matter of seconds.
• You could use BitLocker with pre-boot
authentication (i.e. using a PIN or USB key)
• You could use a BIOS password on boot
• Microsoft is releasing an update to address
the issue. Expected release is November 10.
– ACK to the Microsoft Security Response Center
Ian Haken Bypassing Local Windows Authentication to Defeat Full Disk Encryption 28
Reflections: Why Does This Work?
• The protocol for password changes was
written in RFC 3244 for Windows 2000,
publish in 2002.
• At that point, local access was total access.
Local access wasn’t a valid threat model
during protocol design.
• But local access is precisely the threat model
under which FDE is applicable.
Ian Haken Bypassing Local Windows Authentication to Defeat Full Disk Encryption 29
Black Hat Sound Bytes
• A defect in Windows domain authentication
means BitLocker Full Disk Encryption can be
bypassed; the attack is fast and non-technical.
• Microsoft is releasing a patch for the issue
(expected November 10). Make sure all your
workstations are up-to-date!
• Threat models change; when they do, you
need to re-evaluate previous security choices.

More Related Content

Featured

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

Featured (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

eu-15-Haken-Bypassing-Local-Windows-Authentication-To-Defeat-Full-Disk-Encryption.pdf

  • 1. Bypassing Local Windows Authentication to Defeat Full Disk Encryption Ian Haken
  • 2. Ian Haken Bypassing Local Windows Authentication to Defeat Full Disk Encryption Who Am I? • Currently a security researcher at Synopsys, working on application security tools and Coverity’s static analysis product. • Previously received my Ph.D. in mathematics from UC Berkeley. • Twitter: @ianhaken • Email: ian.haken@synopsys.com 2
  • 3. Ian Haken Bypassing Local Windows Authentication to Defeat Full Disk Encryption 3 Full Disk Encryption • A scheme for protecting data at rest. Encrypts an entire disk or volume. • Mitigates the impact of a threat with physical access; generally does not provide protection against remote adversaries. • Encrypts everything, often including the OS.
  • 4. Ian Haken Bypassing Local Windows Authentication to Defeat Full Disk Encryption 4 Microsoft BitLocker • BitLocker is Microsoft's proprietary full-disk encryption feature. • Built into all professional/enterprise versions of Windows since Vista. • Uses the system's Trusted Platform Module (TPM) to store the master encryption key.
  • 5. Ian Haken Bypassing Local Windows Authentication to Defeat Full Disk Encryption 5 What is a TPM? • A TPM is a hardware module responsible for performing cryptographic operations, performing attestation, and storing secrets. • It has fairly general APIs, so how it is used is mostly up to applications. • Example applications include remote attestation, and storing encryption keys.
  • 6. Ian Haken Bypassing Local Windows Authentication to Defeat Full Disk Encryption 6 Storing Secrets on a TPM • A TPM contains several Platform Configuration Registers (PCRs). • Starting with the BIOS (which is assumed to be trusted), the next part of the boot process (e.g. the MBR) is hashed and this value is stored in the a PCR. • Each stage of the boot process is responsible for hashing the next and storing it in a PCR.
  • 7. Ian Haken Bypassing Local Windows Authentication to Defeat Full Disk Encryption 7 Storing Secrets on a TPM • A boot, the TPM has a zero in all PCR registers. • Whenever the TPM is told to update a register r with a value v, it always sets: r = HASH (r | v) • So PCR values can never get set directly, only appended to. Arbitrary PCR values cannot be spoofed. • This means a set of values in the PCRs can only be replicated by having that same boot chain.
  • 8. Ian Haken Bypassing Local Windows Authentication to Defeat Full Disk Encryption 8 Storing Secrets on a TPM • When the TPM stores a secret key, that key can be sealed. When a key is sealed, the TPM references the current value of the PCRs. • An API call to unseal that key will fail unless the current PCR values match the original values from when the key was sealed. • So effectively, only the original boot process will be able to retrieve that secret key.
  • 9. Ian Haken Bypassing Local Windows Authentication to Defeat Full Disk Encryption 9 Transparent BitLocker • BitLocker, in addition to the TPM, can optionally require a PIN or a key saved on a USB drive. • However, it’s recommended configuration works transparently. It seals the secret key in the TPM and only BitLocker can retrieve it. • Your computer boots up to a login screen as usual, with no indication that FDE is enabled.
  • 10. Ian Haken Bypassing Local Windows Authentication to Defeat Full Disk Encryption 10 BIOS/EFI MBR and bootloader Operating System (Encrypted) RAM
  • 11. Ian Haken Bypassing Local Windows Authentication to Defeat Full Disk Encryption 11 Attacks Given Physical Access • Known Hardware Attacks – Attack the TPM (grounding control pins) – Do a cold-boot attack to get the key from RAM • Attack an early part of the boot chain – Flash the BIOS/EFI with a custom image – Look for a defect in the BIOS, MBR, or boot loader • Or see we can attack the OS itself and see if Windows will give us the key...
  • 12. Ian Haken Bypassing Local Windows Authentication to Defeat Full Disk Encryption 12 Booting Up With BitLocker
  • 13. Ian Haken Bypassing Local Windows Authentication to Defeat Full Disk Encryption 13 Local Windows Authentication • The Local Security Authority (LSA) manages authentication, usually using a Security Subsystem Provider (SSP). • For a client-domain authentication, the Kerberos SSP exchanges messages with the Domain Controller (DC). – When attacking FDE, we have physical access. So we control the network and can run a “mock” DC.
  • 14. Ian Haken Bypassing Local Windows Authentication to Defeat Full Disk Encryption 14 Windows Domain Authentication • Requests a session ticket (TGT) from the DC. – The TGT includes a secret key S, encrypted by the DC with the saved user password. Login screen decrypts S using the typed password. 1. Request TGT 2. TGT, ENC(USER_PW, S) 3. Locally verify response and decrypt S
  • 15. Ian Haken Bypassing Local Windows Authentication to Defeat Full Disk Encryption 15 Windows Domain Authentication • TGT and S are used to request a service ticket T from the DC for the target service (in this case, the local workstation). – The local workstation verifies T. 4. Request for T using TGT and S 5. Responds with T 6. Locally verify T
  • 16. Ian Haken Bypassing Local Windows Authentication to Defeat Full Disk Encryption 16 Machine Passwords • When a workstation first joins a domain... – A secret key is generated, called the machine password. – This password is sent to the DC, so they have a shared secret for future communication. • To grant access to the workstation, the login process must present a valid service ticket T. – This ticket is signed using the machine password. – Which we don't have...
  • 17. Ian Haken Bypassing Local Windows Authentication to Defeat Full Disk Encryption 17 If the DC uses the wrong machine password
  • 18. Ian Haken Bypassing Local Windows Authentication to Defeat Full Disk Encryption 18 The Local Credentials Cache • A user can login when the DC isn’t available – Like when you’re using your laptop at a conference during someone’s talk… • The cache is usually updated whenever the workstation sees the credentials are changed. – So it's updated when you successfully login and were authenticating against the DC. – Also updated when you change your domain password.
  • 19. Ian Haken Bypassing Local Windows Authentication to Defeat Full Disk Encryption 19 Too Bad We Can't Change the Password On the Login Screen
  • 20. Ian Haken Bypassing Local Windows Authentication to Defeat Full Disk Encryption 20 Password Reset
  • 21. Ian Haken Bypassing Local Windows Authentication to Defeat Full Disk Encryption 21 Poisoned Credentials Cache
  • 22. Ian Haken Bypassing Local Windows Authentication to Defeat Full Disk Encryption 22 Poisoned Credentials Cache
  • 23. Ian Haken Bypassing Local Windows Authentication to Defeat Full Disk Encryption 23 What Now? • Dump the BitLocker key from kernel memory – As long as the domain account is a local admin – Although at this point you already have access to all the local user files, so it's pretty moot. • Just dig through personal data – Saved passwords, Outlook emails, source code… – Drop in a trojan / backdoor, or whatever other malware you like.
  • 24. Ian Haken Bypassing Local Windows Authentication to Defeat Full Disk Encryption 24 Demo
  • 25. Ian Haken Bypassing Local Windows Authentication to Defeat Full Disk Encryption 25 System Configurations Effected • Applies to any computer with: – BitLocker without pre-boot authentication – Attached to a domain – With a least one person having logged in with a domain account. • Tested on Windows Vista, Windows 7, and Windows 8.1, Windows 10. – (Also Windows XP and Windows 2000)
  • 26. Ian Haken Bypassing Local Windows Authentication to Defeat Full Disk Encryption 26 How Else Does This Attack Apply? • This isn't really BitLocker specific. More generally, this is an authentication bypass for domain accounts. • If someone is logged in, locks their screen, and steps away, you could use this to unlock the PC. – Someone on their laptop at a coffee shop. – A computer in an office.
  • 27. Ian Haken Bypassing Local Windows Authentication to Defeat Full Disk Encryption 27 Impact and Mitigation • This is 100% reliable attack, software-only, low sophistication, and takes a matter of seconds. • You could use BitLocker with pre-boot authentication (i.e. using a PIN or USB key) • You could use a BIOS password on boot • Microsoft is releasing an update to address the issue. Expected release is November 10. – ACK to the Microsoft Security Response Center
  • 28. Ian Haken Bypassing Local Windows Authentication to Defeat Full Disk Encryption 28 Reflections: Why Does This Work? • The protocol for password changes was written in RFC 3244 for Windows 2000, publish in 2002. • At that point, local access was total access. Local access wasn’t a valid threat model during protocol design. • But local access is precisely the threat model under which FDE is applicable.
  • 29. Ian Haken Bypassing Local Windows Authentication to Defeat Full Disk Encryption 29 Black Hat Sound Bytes • A defect in Windows domain authentication means BitLocker Full Disk Encryption can be bypassed; the attack is fast and non-technical. • Microsoft is releasing a patch for the issue (expected November 10). Make sure all your workstations are up-to-date! • Threat models change; when they do, you need to re-evaluate previous security choices.