Black Hat Presentation – Bypassing Local Windows Authentication to Defeat Full Disk Encryption

You are viewing an old revision of this post, from March 20, 2016 @ 15:36:28. See below for differences between this version and the current revision.

Ian Haken makes a fascinating presentation of his research on bypassing Bitlocker on a Windows machine if you have physical access to the machine you’re trying to crack into. Especially interesting is the point Haken makes at the end that this particular attack works because of assumptions about the security model that Microsoft made years ago that are no longer true–but those assumptions are instantiated in the way that various parts of Windows authentication works.

 

Post Revisions:

Changes:

March 20, 2016 @ 15:36:28Current Revision
Content
Deleted: Ian Haken makes a fascinating presentation of his research on bypassing Bitlocker on a Windows machine if you have physical access to the machine you're trying to crack into. Especially interesting is the point Haken makes at the end that this particular attack works because of assumptions about the security model that Microsoft made years ago that are no longer true--but those assumptions are instantiated in the way that various parts of Windows authentication works.  Added: Ian Haken makes a fascinating presentation of his research on bypassing Bitlocker on a Windows machine if you have physical access to the machine you're trying to crack into. Especially interesting is the point Haken makes at the end that this particular attack worked (Microsoft has since fixed this particular issue)  because of assumptions about the security model that Microsoft made years ago that are no longer true--but those assumptions are instantiated in the way that various parts of Windows authentication works.
Unchanged:   Unchanged:  
Unchanged: https://www.youtube.com/ watch?v=eRuca6eAdFM Unchanged: https://www.youtube.com/ watch?v=eRuca6eAdFM

Note: Spaces may be added to comparison text to allow better line wrapping.

Leave a Reply