Re: Bitlocker without PIN
- From: Ansgar Wiechers <bugtraq@xxxxxxxxxxxxxxxx>
- Date: Fri, 25 Feb 2011 11:54:40 +0100
On 2011-02-24 Per Thorsheim wrote:
"Transparent" Bitlocker with TPM and direct boot to Windows Logon is not
a good idea in terms of security.
At the Passwords^10 conference in Dec 2010, Passware revealed their
newest versio of their forensic toolkit. You probably want to see that:
Using Passware Forensic Toolkit you can extract the bitlocker key using
live memory dumping through Firewire (either by using an existing
Firewire port, or by inserting an pcmcia/expresscard firewire card). No
need to logon to Windows there...
Depending on your configuration, the hibernation file may be
unencrypted. This can then be extracted from the disk and analyzed to
get the bitlocker decryption key as well.
1. Superglue for your Firewire and pcmcia/expresscard ports
2. Do not allow hibernation mode OR encrypt the hibernation file as well
3. Always use Pre-Boot Authentication (PBA) in some form (pin, password,
It should be able to mitigate the risks you outlined above.
"All vulnerabilities deserve a public fear period prior to patches
--Jason Coombs on Bugtraq