k0lj4.bsky.social
@k0lj4.bsky.social
Reposted
From startups to large companies, we've seen this setup used by many corporate clients in the wild. Here's why this is so difficult to fix and Microsoft has not changed the exploitable default settings yet: neodyme.io/blog/bitlock...
On Secure Boot, TPMs, SBAT, and downgrades -- Why Microsoft hasn't fixed BitLocker yet
On Secure Boot, TPMs, SBAT and Downgrades -- Why Microsoft hasn't fixed BitLocker yet
neodyme.io
January 17, 2025 at 2:20 PM
I agree this will just make it a bit harder, but is by no means a proper fix for the underlying issue. There are probably different ways to inject code and I think vulnerable signed DLLs (itm4n.github.io/ghost-in-the...) might also be an option but I have not looked into it further.
Ghost in the PPL Part 1: BYOVDLL
In this series of blog posts, I will explore yet another avenue for bypassing LSA Protection in Userland. I will also detail the biggest challenges I faced while developing a proof-of-concept, and dis...
itm4n.github.io
December 29, 2024 at 9:31 AM