You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I'm conducting a security analysis of a locked Windows 10/11 workstation. It's an HP EliteBook 650 G9 model.
The disk is full-encrypted using Bitlocker. However, no PBA is enabled and I have full access to the BIOS. So once the workstation is booted up, I am seeing the regular Windows lock screen.
I've started disabling security features within the BIOS such as:
Disabling Virtualization Based BIOS Protection
Trusted Execution Technology (TXT)
Virtualization Technology (VTx);
I've enabled this later on again when reading through the issues here on GitHub
Virtualization Technology (VTd)
DMA Protection
However, as soon as I disable TXT and VTd, I am greeted by the Bitlocker Recovery Key screen. TXT must be disabled in order to gain access to the VTd checkbox for disabling.
Am I correct that the DMA attack via Squirrle PCI will not work then?
I would likely have to conduct others attacks such as:
Hi @ufrisk ,
many thanks for this very cool project.
I'm conducting a security analysis of a locked Windows 10/11 workstation. It's an HP EliteBook 650 G9 model.
The disk is full-encrypted using Bitlocker. However, no PBA is enabled and I have full access to the BIOS. So once the workstation is booted up, I am seeing the regular Windows lock screen.
I've started disabling security features within the BIOS such as:
However, as soon as I disable TXT and VTd, I am greeted by the Bitlocker Recovery Key screen. TXT must be disabled in order to gain access to the VTd checkbox for disabling.
Am I correct that the DMA attack via Squirrle PCI will not work then?
I would likely have to conduct others attacks such as:
The text was updated successfully, but these errors were encountered: