2024-12-14 –, Workshop Room 1
In this workshop, participants will delve into the intricacies of bypassing BitLocker encryption in TPM Only mode. Through hands-on exercises, attendees will gain practical knowledge on monitoring SPI buses with digital logic analysers, extracting TPM data, and mounting and decrypting disks. This session is tailored for penetration testers performing stolen device assessments, red team professionals, security enthusiasts seeking to secure their devices, and forensic analysts involved in data recovery.
We are inviting you to a comprehensive workshop designed to provide an introduction into bypassing BitLocker encryption. This session will focus on Bypassing BitLocker in TPM Only Mode on laptop with an SPI bus.
Participants will explore and engage in the following:
* Monitoring SPI Buses with Digital Logic Analysers: Learn how to use digital logic analysers to monitor and interpret SPI bus communications.
* Extracting TPM Data: Gain hands-on experience in extracting data from buses for TPM chips.
* Mounting and Decrypting Disks: Discover how to mount and decrypt disks protected by BitLocker. This practical exercise will illustrate the step-by-step process of bypassing encryption and gaining access to secured data.
* Discussion of other bypass techniques
Who Should Attend:
- Penetration Testers: Enhance your toolkit for stolen device assessments and red team engagements by mastering techniques to bypass BitLocker encryption.
- Security Enthusiasts: Understand the vulnerabilities of your own devices and learn how to better protect them against sophisticated attacks.
- Forensic Analysts: Acquire essential skills for data recovery and forensic investigations involving BitLocker-protected devices.
This workshop is structured to provide both theoretical knowledge and practical experience, ensuring that participants leave with a basic understanding of BitLocker bypass techniques and the confidence to apply them in real-world scenarios.
Knowledge Prerequisites:
- Basic Windows familiarity
- Basic Linux familiarity
- Awareness of BitLocker
Attendees will need to bring own laptop with Kali Linux and the dislocker package installed. All other materials will be provided.
Darren has been penetration testing for 16 years, spending the last 6 years running his own small penetration testing consultancy Cryptic Red. He's into red teaming, hardware hacking, and coding rust.
Hacker of all things.