Plumber’s Summit Day 1: Wasmtime and plugins, WASI 0.2.1, OCI artifacts and registry roadmap
The Bytecode Alliance Plumber’s Summit gathered in Raleigh, NC on January 31, 2024 to celebrate the release of WASI 0.2 and collaborate on the next steps forward for the WebAssembly ecosystem.The first day of the two-day summit focused o...
The WASI Subgroup voted on January 25, 2024 to launch WASI 0.2, also knownas WASI Preview 2, or WASIp2! This blog post is a brief look at the present,past, and future of WASI, and a repost of an original article sharedhere.
Breaking Bitlocker - Bypassing the Windows Disk Encryption
In this video we will use a hardware attack to bypass TPM-based Bitlocker encryption as used on most Microsoft Windows devices.
Errata:
- PIN can also be enabled using manage-bde, not just using group policies
Questions:
- Does this work on TPM2.0? Yes, at least on some: https://pulsesecurity.co.nz/articles/TPM-sniffing
Links:
- https://hextree.io/
- Pascal Gujer: https://twitter.com/pascal_gujer / https://hands-on-security.com
- Enabling Bitlocker PIN: https://www.howtogeek.com/262720/how-to-enable-a-pre-boot-bitlocker-pin-on-windows/
- Hardware & source-code: https://github.com/stacksmashing/pico-tpmsniffer
- LPC Clockless Analyzer for Saleae: https://github.com/stacksmashing/LPCClocklessAnalyzer
Me:
- Twitter: https://twitter.com/ghidraninja
- Patreon: https://patreon.com/stacksmashing
Posts about sniffing bitlocker:
- https://labs.withsecure.com/publications/sniff-there-leaks-my-bitlocker-key
- https://www.secura.com/blog/tpm-sniffing-attacks-against-non-bitlocker-targets
- https://blog.scrt.ch/2021/11/15/tpm-sniffing/
- https://pulsesecurity.co.nz/articles/TPM-sniffing