So I’ve just had a quick play with this and yes, it works. Essentially BitLocker has a backdoor. https://github.com/Nightmare-Eclipse/YellowKey
Mitigation = BitLocker PIN and BIOS password lock.
Post
So I’ve just had a quick play with this and yes, it works. Essentially BitLocker has a backdoor. https://github.com/Nightmare-Eclipse/YellowKey
Mitigation = BitLocker PIN and BIOS password lock.
@tanavit @GossiTheDog
Haha oui j'ai vu passer ça, ainsi qu'une faille RCE dans Word.
@GossiTheDog I am shocked. Shocked I say!
Rememeber: never ask “is this Microsoft security product backdoored?”
Instead ask: “how exactly is it backdoored? How many back doors are there?”
@GossiTheDog not a Windows guy so forgive me but I don’t get it. Copy the Fstx folder from where? The target system itself?
@gsuberland @GossiTheDog oh right, sorry didn’t notice it there 🙂 and how do you click restart without being already in? Not a Windows user, I’m sure you can tell
@mkoek @GossiTheDog I'm pretty sure this only bypasses the bitlocker config where there's no password, just a key held by the TPM, which is supposed to protect against offline attacks (e.g. unplug your disk and plug it into another machine). so what you do is boot the victim system up to the login screen, follow the procedure here, and it drops you into cmd after bitlocker unlocks. so it really functions more like a login bypass than what most people would think when you say "bitlocker bypass".