Thanks for this amazing video ! I ordered some PCB and started soldering the PICO, thou the pogo pins are a pain to solder, any tips ?
@halvarmc6714 күн бұрын
The best practice is to always 0 your drive before recycling or 0 and reinstall the OS if you're selling the laptop. In the case of externals, I always 0 or reformat.
@Turco9494 күн бұрын
A single pass zero-write is hardly that guaranteed that the data can never be recovered. Best is to wipe/zero write the drive then physically destroy it. At the very least, a 3-pass DOD level wipe or something equivalent is needed.
@Mani-kt5iw5 күн бұрын
Would it also work if us a esp32 instead of the Raspberri pi pico
@cat-win985 күн бұрын
STOP CENSORING THE SCREEN!!!!!!! 🤬🤬🤬🤬🤬😡😡😡😡
@cat-win985 күн бұрын
WHY DO YOU CENSOR THE SCREEN???????? 😡😡🤬🤬🤬🤬🤬
@stacksmashing5 күн бұрын
Because Nintendo sent a take down.
@Rayan-Singh7 күн бұрын
So this won't work on newer CPU's that use TPM which is inbuilt on the CPU like Newer Gen Ryzen and Intel ?
@literallydoing442510 күн бұрын
well, linux *is* in fact better IG
@pcguy5491-the-modern-retro-man11 күн бұрын
Next video should be why 222222222222222 is a valid quake 3 arena cd key
@pcguy5491-the-modern-retro-man11 күн бұрын
Monster truck madness, office 95/97, microsoft hellbender and any microsoft product before 1998 except plus 98 also works with this same key too.
@walsterdoomit12 күн бұрын
Above my pay grade but pretty cool video.
@Vadermods13 күн бұрын
now as a cherry on top, make a multiplayer game besides Tetris, something open world would be groundbreaking if you built it it on top of the wifi cart we have avalible to us now.
@marcoc.602213 күн бұрын
Is it also possible to remove the linked apple id?
@YogurtGood14 күн бұрын
cool
@IIIIIIIIIIIllllllIIIIIIIIIII16 күн бұрын
Awesome
@lashlarue792416 күн бұрын
I am a lowly sweet potato 🍠 and do not comprehend such things. Serve me piping hot with a pinch of cinnamon and a dollop of bytecode.
@TheTarkovSh00ter17 күн бұрын
Add a pin, dont store stuff that you need on main drive. This only gets you into windows it doesnt decrypt other drives.
@joelstolarski224417 күн бұрын
Amazing and so well explained. Have a dell micro 3080 that belonged to a company, recovered from an unpaid storage unit. Have bought several laptops the same way. This is first one, that had a bitlocker encrypted drive. I'm new to using kali, and have done an 8266 nodmcu deauth chip, but this is a little more involved. Don't have a raspberry pi yet. Thanks for the tutorial !
@DeweckPewez17 күн бұрын
PS2 Slim
@DeweckPewez17 күн бұрын
GAME BOY COLOR ONLINE MULTIPLAYER
@michaelknight404117 күн бұрын
I don't know about this guy. The Indian dude hacking and splicing a standard USB to a Lightning cable with a resistor and a capacitor in between while horrible Indian music looped over and over seemed more trustworthy. Im gonna go see what hes up to.
@nataliegrn1717 күн бұрын
Thanks!
@Smiley_Frown20 күн бұрын
Who are you
@silvereagleranch735221 күн бұрын
what hardware do u need to buy... for my machine?
@CoachMikeyStudios23 күн бұрын
I used to encrypt hard drives all the time in the windows XP days. It would take days. I always wanted to know why bitlocker works so quickly. Great video. Thanks for sharing.
@mbican23 күн бұрын
Well, of course TPM without PIN is useless, you just turn on the laptop and it is decrypted, you can also do cold boot attack and read memory, there is many ways how to bypass TPM without PIN, it's a lock without a key 🤷♂️
@Muhammad-re4wk24 күн бұрын
The way he says Ghidra drives me crazy
@stacksmashing23 күн бұрын
yep, completely wrong 😀 sorry about that
@damny0utoobe24 күн бұрын
Excellent tutorial
@NeverSuspects24 күн бұрын
Anyone who would care to steal encrypted data would come prepared or have taken the whole laptop to gain access to it with no time limit.. Anyone who really really want to get access will find information like this video and read a bit and carry out the process.. so what dies this whole thing really provide to the user outside of possibly difficult recovery process?? Microsoft gets a new word to use in marketing the os "Secured with BitLocker!"
@jackkirby528725 күн бұрын
How do I identify which chip is the TPM? And how do I identify the LPC bus? I've been looking over an HP for hours and I cannot seem to find either one.
@nnibxx25 күн бұрын
Awesome, do you know how is wired (color coded) in the terminal?
@aurelienlevra378225 күн бұрын
Most pedagogic content about a presentation of how the ELF format work. Top tier quality content
@RapidWildFire25 күн бұрын
Companies should still throw the harddrive when they sell laptops separately. This is for the sole purpose of stopping african criminals from recovering loose hard drives found in garbage dumps and selling their data. This whole bitlocker thing is for promoting shipping deceased hardware to 3rd wirld countries garbage dumps. Which is a very bad act in my opinion
@censoredeveryday332026 күн бұрын
Or voltage and current glitching. An art that few have experience with.
@KuldeepYadav-jw7jn26 күн бұрын
Is there any in depth article or anything which explains the position independent execution in depth?
@-MohammedElSyed-26 күн бұрын
Why can't I store my keys on the MY FCKIN' USB DRIVE or just use password? Why am I forced to store my keys on that proprietary device which can't be dismounted from the machine?????? This industry is full of idiots.
@TheyCallMeApplePie26 күн бұрын
Came her to kill some time. Dont understand a damn thing, but i like the video
@trickyd49926 күн бұрын
i have bitlocked a drive, to mount it i have to enter the key manually. i presume im safe in that case
@elalemanpaisa27 күн бұрын
There are even easier attacks on luks because tpm happily tells you the keys
@XenXenOfficial27 күн бұрын
Just letting you know guys, I took the liberty to go out of my way and buy the parts, the board, etc etc. it's "less than 10 dollars of parts" cause the boards are $8-$9 dollars each, 4 boards minimum order, 8.99 for the prongs (comes in 100 pieces, so 8.99/100) and the pico which you can probably find for dirt cheap but I just bought a 2 pack for 17 dollars BUT. Still, considering how bitlocker is, how easily it gets triggered, and how many Lenovo PCs that I as a computer engineer work with this tool is extremely valuable lol
@XenXenOfficial27 күн бұрын
I would love a good suggestion to make it universal for whatever LPC bitlocker locked motherboard I find though, my first thought that came to mind is just soldering on some wires to the board and using them as contact points in case the connector isn't the right pinout or a different shape 🤔
@stacksmashing27 күн бұрын
Yeah we’ve been thinking about a couple of ideas for a more universal board - there’s also a PR for SPI support
@XenXenOfficial27 күн бұрын
@@stacksmashing PLEASE, I would LOVE SPI support. I'll pay lmao
@XenXenOfficial27 күн бұрын
@@stacksmashing if theres some modifications I could do to the board I got coming in or the code please let me know! Edit: I've done PCB work, made my own traces, etc. so really any modifications would be possible lol
@Scatman11927 күн бұрын
Gutes Video, aber du musst unbedingt mal an deiner Aussprache üben. Ist echt anstrengend anzuhören.
@markmurphy357828 күн бұрын
Interesting to see how relatively simple these are to exploit once the hardware has been investigated. I guess that removable storage would be a completely different matter. Time for me to subscribe
@Tecnoesclavos28 күн бұрын
First Step. Error. Invalid Function Signature Can't parse name: argv[] Do you want to continue editing or abort your changes?
@stacksmashing28 күн бұрын
Set it to char ** argv instead of char * argv[] That’s also how it’s in the video in the second step - I assume [] is now reserved
@Tecnoesclavos28 күн бұрын
@@stacksmashing yep it works, thank you!
@stacksmashing28 күн бұрын
No worries :) hope they eventually support that syntax
@Dan-qc7kq29 күн бұрын
This TPM vulnerability is not new, it has been known for a number of years, but stacksmashing has created an excellent demonstration that shows how quickly an automated attack can intercept the encryption key and use it to decrypt the drive of a vulnerable system. Keep in mind that this attack only works against computers that have an external TPM mounted on the motherboard, which is no longer a common practice. Nowadays most PCs and laptops have TPM functionality built into their CPU, which makes the encryption key MUCH harder to intercept. It might still be possible, but so far I have not heard of any successful attempts. The other thing to remember is that this attack would have failed instantly if the user had merely set their BitLocker startup PIN or one of the other types of BitLocker preboot authentication. If you use BitLocker and you truly care about your security then you should definitely do this. To summarize, if you have a newer computer with a CPU-based TPM and/or if you have set the BitLocker startup PIN then you should be quite safe from this type of attack. That should be your main takeaway from this video.
@carrycat876Ай бұрын
You are directly responsible for my microsoft stock going down last month. At the same time I appreciate your video very much
@videodude8137Ай бұрын
Your are an excellent speaker, and gave an excellent tutorial. No silly background music. Very nice! Thank you.
@evolancer211Ай бұрын
I want that! I would have so much fun at work with some of my coworkers bitlocker encrypted laptops 😂
@jackkirby5287Ай бұрын
What kind of logic analyzer are you using?
@stacksmashingАй бұрын
Saleae
@Bike1337Ай бұрын
Pra quem quiser e precisar remover a senha de fato sem formatar o disco veja essa técnica do vídeo abaixo. kzread.info/dash/bejne/qYiglth-lcfUm7Q.html
@nbaua3454Ай бұрын
Next laptops will come with resin glued circuits all over making this as difficult to repair as it is not today...
Пікірлер
Now play DOOM on it.
Thanks for this amazing video ! I ordered some PCB and started soldering the PICO, thou the pogo pins are a pain to solder, any tips ?
The best practice is to always 0 your drive before recycling or 0 and reinstall the OS if you're selling the laptop. In the case of externals, I always 0 or reformat.
A single pass zero-write is hardly that guaranteed that the data can never be recovered. Best is to wipe/zero write the drive then physically destroy it. At the very least, a 3-pass DOD level wipe or something equivalent is needed.
Would it also work if us a esp32 instead of the Raspberri pi pico
STOP CENSORING THE SCREEN!!!!!!! 🤬🤬🤬🤬🤬😡😡😡😡
WHY DO YOU CENSOR THE SCREEN???????? 😡😡🤬🤬🤬🤬🤬
Because Nintendo sent a take down.
So this won't work on newer CPU's that use TPM which is inbuilt on the CPU like Newer Gen Ryzen and Intel ?
well, linux *is* in fact better IG
Next video should be why 222222222222222 is a valid quake 3 arena cd key
Monster truck madness, office 95/97, microsoft hellbender and any microsoft product before 1998 except plus 98 also works with this same key too.
Above my pay grade but pretty cool video.
now as a cherry on top, make a multiplayer game besides Tetris, something open world would be groundbreaking if you built it it on top of the wifi cart we have avalible to us now.
Is it also possible to remove the linked apple id?
cool
Awesome
I am a lowly sweet potato 🍠 and do not comprehend such things. Serve me piping hot with a pinch of cinnamon and a dollop of bytecode.
Add a pin, dont store stuff that you need on main drive. This only gets you into windows it doesnt decrypt other drives.
Amazing and so well explained. Have a dell micro 3080 that belonged to a company, recovered from an unpaid storage unit. Have bought several laptops the same way. This is first one, that had a bitlocker encrypted drive. I'm new to using kali, and have done an 8266 nodmcu deauth chip, but this is a little more involved. Don't have a raspberry pi yet. Thanks for the tutorial !
PS2 Slim
GAME BOY COLOR ONLINE MULTIPLAYER
I don't know about this guy. The Indian dude hacking and splicing a standard USB to a Lightning cable with a resistor and a capacitor in between while horrible Indian music looped over and over seemed more trustworthy. Im gonna go see what hes up to.
Thanks!
Who are you
what hardware do u need to buy... for my machine?
I used to encrypt hard drives all the time in the windows XP days. It would take days. I always wanted to know why bitlocker works so quickly. Great video. Thanks for sharing.
Well, of course TPM without PIN is useless, you just turn on the laptop and it is decrypted, you can also do cold boot attack and read memory, there is many ways how to bypass TPM without PIN, it's a lock without a key 🤷♂️
The way he says Ghidra drives me crazy
yep, completely wrong 😀 sorry about that
Excellent tutorial
Anyone who would care to steal encrypted data would come prepared or have taken the whole laptop to gain access to it with no time limit.. Anyone who really really want to get access will find information like this video and read a bit and carry out the process.. so what dies this whole thing really provide to the user outside of possibly difficult recovery process?? Microsoft gets a new word to use in marketing the os "Secured with BitLocker!"
How do I identify which chip is the TPM? And how do I identify the LPC bus? I've been looking over an HP for hours and I cannot seem to find either one.
Awesome, do you know how is wired (color coded) in the terminal?
Most pedagogic content about a presentation of how the ELF format work. Top tier quality content
Companies should still throw the harddrive when they sell laptops separately. This is for the sole purpose of stopping african criminals from recovering loose hard drives found in garbage dumps and selling their data. This whole bitlocker thing is for promoting shipping deceased hardware to 3rd wirld countries garbage dumps. Which is a very bad act in my opinion
Or voltage and current glitching. An art that few have experience with.
Is there any in depth article or anything which explains the position independent execution in depth?
Why can't I store my keys on the MY FCKIN' USB DRIVE or just use password? Why am I forced to store my keys on that proprietary device which can't be dismounted from the machine?????? This industry is full of idiots.
Came her to kill some time. Dont understand a damn thing, but i like the video
i have bitlocked a drive, to mount it i have to enter the key manually. i presume im safe in that case
There are even easier attacks on luks because tpm happily tells you the keys
Just letting you know guys, I took the liberty to go out of my way and buy the parts, the board, etc etc. it's "less than 10 dollars of parts" cause the boards are $8-$9 dollars each, 4 boards minimum order, 8.99 for the prongs (comes in 100 pieces, so 8.99/100) and the pico which you can probably find for dirt cheap but I just bought a 2 pack for 17 dollars BUT. Still, considering how bitlocker is, how easily it gets triggered, and how many Lenovo PCs that I as a computer engineer work with this tool is extremely valuable lol
I would love a good suggestion to make it universal for whatever LPC bitlocker locked motherboard I find though, my first thought that came to mind is just soldering on some wires to the board and using them as contact points in case the connector isn't the right pinout or a different shape 🤔
Yeah we’ve been thinking about a couple of ideas for a more universal board - there’s also a PR for SPI support
@@stacksmashing PLEASE, I would LOVE SPI support. I'll pay lmao
@@stacksmashing if theres some modifications I could do to the board I got coming in or the code please let me know! Edit: I've done PCB work, made my own traces, etc. so really any modifications would be possible lol
Gutes Video, aber du musst unbedingt mal an deiner Aussprache üben. Ist echt anstrengend anzuhören.
Interesting to see how relatively simple these are to exploit once the hardware has been investigated. I guess that removable storage would be a completely different matter. Time for me to subscribe
First Step. Error. Invalid Function Signature Can't parse name: argv[] Do you want to continue editing or abort your changes?
Set it to char ** argv instead of char * argv[] That’s also how it’s in the video in the second step - I assume [] is now reserved
@@stacksmashing yep it works, thank you!
No worries :) hope they eventually support that syntax
This TPM vulnerability is not new, it has been known for a number of years, but stacksmashing has created an excellent demonstration that shows how quickly an automated attack can intercept the encryption key and use it to decrypt the drive of a vulnerable system. Keep in mind that this attack only works against computers that have an external TPM mounted on the motherboard, which is no longer a common practice. Nowadays most PCs and laptops have TPM functionality built into their CPU, which makes the encryption key MUCH harder to intercept. It might still be possible, but so far I have not heard of any successful attempts. The other thing to remember is that this attack would have failed instantly if the user had merely set their BitLocker startup PIN or one of the other types of BitLocker preboot authentication. If you use BitLocker and you truly care about your security then you should definitely do this. To summarize, if you have a newer computer with a CPU-based TPM and/or if you have set the BitLocker startup PIN then you should be quite safe from this type of attack. That should be your main takeaway from this video.
You are directly responsible for my microsoft stock going down last month. At the same time I appreciate your video very much
Your are an excellent speaker, and gave an excellent tutorial. No silly background music. Very nice! Thank you.
I want that! I would have so much fun at work with some of my coworkers bitlocker encrypted laptops 😂
What kind of logic analyzer are you using?
Saleae
Pra quem quiser e precisar remover a senha de fato sem formatar o disco veja essa técnica do vídeo abaixo. kzread.info/dash/bejne/qYiglth-lcfUm7Q.html
Next laptops will come with resin glued circuits all over making this as difficult to repair as it is not today...