ぽこ☆ うさぎ大好き♪ · @pokousa
36 followers · 15272 posts · Server pawoo.net

結局、ぶっちゃけて書けば
自分で管理できる(=違法なら自己責任で捕まる)物理鯖とドメインを用意して、そこにDNSとサイト構築して、決済サービスも自分で賄えばええのよ。
 
捕まるリスクや匿名化は他人任せのくせに、運営がどーこー言うのは少し違うと思う。

#1day

Last updated 1 year ago

WACOCA · @wacoca
24 followers · 40007 posts · Server mastodon.cloud
Sinan Kozak · @snnkzk
160 followers · 122 posts · Server androiddev.social

The nattery lasts all day

#Pixel7 #1day

Last updated 1 year ago

· @recreationlaw
6 followers · 61 posts · Server mastodon.social
· @recreationlaw
8 followers · 103 posts · Server mastodon.social
Rairii · @Rairii
1337 followers · 222 posts · Server haqueers.com

It's been a few months since patch, let's talk about a BitLocker bypass I found. Here's dangerous association, or

The underlying issue here is an incorrect patch for

The initial bug was: with legacy integrity validation, FvebpCalculateDataHashes attempts to iterate over all boot options and all associated boot options to hash them (where an authenticated hash is in on-disk BitLocker metadata). However, the list of associated options were walked through incorrectly: the structure uses an offset from the start of structure, whereas the incorrect code added the offset to a pointer in the middle of the structure.

The patch for did fix this error, but there was another fail:

When looking for a boot option, the boot environment recursively walks associated options lists; FvebpCalculateDataHashes would only hash one level of associated options. This means that associated options on the second level or deeper are invisible to BitLocker legacy integrity validation (and when used will not force BitLocker into recovery mode).

Associated options are only used by device elements, and in Windows 8 and above, one device element (osdevice) is allowed without being hashed (because osdevice describes the partition with integrity validation being checked).

Therefore, attacker could create two device boot entries, configure the osdevice to use the first one as associated options, add the same osdevice there using the second one as associated options and set debug=on in the second one. The system would boot with kernel debugging enabled, attacker could then connect to the kernel debugger and dump the bitlocker keytable.

I'm assuming Secure Boot is disabled here, for which legacy integrity validation would be the default. If legacy integrity validation is used with Secure Boot enabled (not default, but what I recommend, Secure Boot integrity validation is broken), and PCR 7 is used when sealing the VMK (also not default, but again what I recommend), it should be possible to chain with baton drop if the system is also vulnerable to that.

No easy PoC today, but this is enough information you need to do it yourself.

When using BitLocker, do NOT use the default settings. Instead, use legacy integrity validation configured for PCRs 0,2,4,7,11. This ensures that an attacker needs to find an exploitable bug in the version of bootmgr, winload or winresume on your system, and can't just use a downgrade attack or find a bug in some other lesser known boot application to dump bitlocker keys.

"Automatic BitLocker" is security theatre. That there were reports of actual data loss after the last dbx update is inexcusable.

timeline:
2022-05-11: discovery, report to MSRC
2022-06-15: reproduced by MS
2022-06-23: initial fix in Windows Insider Preview build 25145
2022-07-12: wide release of fix
2022-12-01: disclosure

#CVE_2022_22048 #CVE_2022_29127 #1day #BitLocker #exploit #vulnerability #infosec

Last updated 2 years ago

cjw · @cjw
9 followers · 15 posts · Server mastodonapp.uk

England are now T20 and One Day cricket champions

#england #Englishcricket #t20 #50overs #1day #WorldChampions

Last updated 2 years ago