![]() “When you enable BitLocker in its default configuration, no additional user interaction is required at boot. He tested his findings against two different devices – a HP laptop featuring a TPM1.2 chip, and a Surface Pro 3 with TPM2.0 chip. Reportedly, he could extract encryption keys from the Trusted Platform Module (TPM) chip of the target computer by hard wiring the motherboard through a field programming gate array. After sniffing, you can decrypt the drive” “You can sniff BitLocker keys in the default config, from either a TPM1.2 or TPM2.0 device, using a dirt cheap FPGA and now publicly available code, or with a sufficiently fancy logic analyzer. Using this technique, the attacker can decrypt the drive and access stored data.Īs stated in his report about the findings, The attack method requires physical access from the attacker. Extracting BitLocker Encryption KeysĪccording to a report by Denis Andzakovic from Pulse Security, the researcher has found a new attack method that can compromise BitLocker encryption keys. ![]() This attack method requires physical access to the target device. As a result, the attack puts the security of the stored data on target laptops at risk of hacking. A researcher has found a new attack method that can extract BitLocker encryption keys.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |