Penetration Testing Windows Vista TM BitLocker TM



Similar documents
BitLocker Drive Encryption Hardware Enhanced Data Protection. Shon Eizenhoefer, Program Manager Microsoft Corporation

How to Encrypt your Windows 7 SDS Machine with Bitlocker

Encrypting stored data. Tuomas Aura T Information security technology

Firewire-based Physical Security Attacks on Windows 7, EFS and BitLocker

Trustworthy Computing

Windows Server 2008 R2 Boot Manager Security Policy For FIPS Validation

Bypassing Local Windows Authentication to Defeat Full Disk Encryption. Ian Haken

Security Overview for Windows Vista. Bob McCoy, MCSE, CISSP/ISSAP Technical Account Manager Microsoft Corporation

Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory

Introduction to BitLocker FVE

USB Portable Storage Device: Security Problem Definition Summary

Secure Storage. Lost Laptops

USB Portable Storage Device: Security Problem Definition Summary

Embedded Trusted Computing on ARM-based systems

Using BitLocker As Part Of A Customer Data Protection Program: Part 1

SecureDoc Disk Encryption Cryptographic Engine

Bypassing Self- Encrypting Drives (SED) in Enterprise Environments. Daniel Boteanu Kevvie Fowler November 12 th, 2015

Disk Encryption. Aaron Howard IT Security Office

Firmware security features in HP Compaq business notebooks

Full Drive Encryption Security Problem Definition - Encryption Engine

Operating System Security

Whitepaper Enhancing BitLocker Deployment and Management with SimplySecure. Addressing the Concerns of the IT Professional Rob Weber February 2015

Managing BitLocker Encryption

Protecting Data with Short- Lived Encryption Keys and Hardware Root of Trust. Dan Griffin DefCon 2013

Technical Brief Distributed Trusted Computing

Patterns for Secure Boot and Secure Storage in Computer Systems

Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives

UNCLASSIFIED Version 1.0 May 2012

EMBASSY Remote Administration Server (ERAS) BitLocker Deployment Guide

Computer Security: Principles and Practice

Enhancing Organizational Security Through the Use of Virtual Smart Cards

Forensic Decryption of FAT BitLocker Volumes

Windows 7. Qing Liu Michael Stevens

Trusted Platform Module

Security Policy for FIPS Validation

Security and Compliance. Robert Nottoli Principal Technology Specialist Microsoft Corporation

Trusted Platforms for Homeland Security

Dell Client BIOS: Signed Firmware Update

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Making Data at Rest Encryption Easy

Encrypting with BitLocker for disk volumes under Windows 7

YOUR DATA UNDER SIEGE. DEFEND IT WITH ENCRYPTION.

Windows BitLocker TM Drive Encryption Design Guide

Hardware Security Modules for Protecting Embedded Systems

FIPS Security Policy 3Com Embedded Firewall PCI Cards

Windows Phone 8 Security Overview

SecureD Technical Overview

Functional diagram: Secure encrypted data. totally encrypted. XOR encryption. RFID token. fingerprint reader. 128 bit AES in ECB mode Security HDD

UNCLASSIFIED CPA SECURITY CHARACTERISTIC SOFTWARE FULL DISK ENCRYPTION. Version 1.1. Crown Copyright 2011 All Rights Reserved

FIPS Non Proprietary Security Policy: Kingston Technology DataTraveler DT4000 Series USB Flash Drive

Protecting Your Organisation from Targeted Cyber Intrusion

Certification Report

Navigating Endpoint Encryption Technologies

Data At Rest Protection

YubiKey Integration for Full Disk Encryption

Side Channel Analysis and Embedded Systems Impact and Countermeasures

Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75

Secure Network Communications FIPS Non Proprietary Security Policy

Making Data Security The Foundation Of Your Virtualization Infrastructure

Pulse Secure, LLC. January 9, 2015

Global security intelligence. YoUR DAtA UnDeR siege: DeFenD it with encryption. #enterprisesec kaspersky.com/enterprise

That Point of Sale is a PoS

Windows BitLocker Drive Encryption Step-by-Step Guide

Windows 7 BitLocker Drive Encryption Security Policy For FIPS Validation

Secure Data Management in Trusted Computing

IoT Security Concerns and Renesas Synergy Solutions

Lecture Embedded System Security Dynamic Root of Trust and Trusted Execution

Using AES 256 bit Encryption

Disk encryption... (not only) in Linux. Milan Brož

TPM. (Trusted Platform Module) Installation Guide V for Windows Vista

Windows XP Support stops on 8. April 2014

SkyRecon Cryptographic Module (SCM)

Secure USB Flash Drive. Biometric & Professional Drives

SECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES

Cautions When Using BitLocker Drive Encryption on PRIMERGY

Do "standard tools" meet your needs when it comes to providing security for mobile PCs and data media?

Microsoft Windows Common Criteria Evaluation

CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules

Safeguarding Data Using Encryption. Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Using the TPM: Data Protection and Storage

Self-Encrypting Drives

Property Based TPM Virtualization

Index. BIOS rootkit, 119 Broad network access, 107

CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS

Factory-Installed, Standards-Based Hardware Security. Steven K. Sprague President & CEO, Wave Systems Corp.

Implementing Hardware Roots of Trust: The Trusted Platform Module Comes of Age Sponsored by the Trusted Computing Group (TCG)

Patch and Vulnerability Management Program

ProtectV. Securing Sensitive Data in Virtual and Cloud Environments. Executive Summary

Frontiers in Cyber Security: Beyond the OS

Industrial Flash Storage Trends in Software and Security

An Improved Trusted Full Disk Encryption Model

Kaseya US Sales, LLC Virtual System Administrator Cryptographic Module Software Version: 1.0

Security within a development lifecycle. Enhancing product security through development process improvement

Transcription:

Penetration Testing BitLocker TM Drive Encryption Douglas MacIver Penetration Engineer System Integrity Group, Corporation Hack In The Box 2006/09/21 2006 Corporation. All rights reserved.

Trustworthy Computing The security of our customers' computers and networks is a top priority, and we are committed to building software and services to better help protect our customers and the industry. Threats discussed in this presentation are not secrets Our customers adversaries are aware of these attack vectors Our customers need this information too, so that they may make informed decisions about the level of data protection that they need 2 2006 Corporation. All rights reserved.

Presentation Outline BitLocker Introduction BitLocker Technical Highlights Pen Testing BitLocker Top Threats Part 1 (basic mode) Top Threats Part 2 (advanced modes) Summary Questions (at the end, please) 3 2006 Corporation. All rights reserved.

BitLocker Drive Encryption: Feature Introduction Data Confidentiality Encrypts the OS volume Secure decommissioning System Integrity Cryptographically validates pre-os components The lost or stolen laptop is the primary threat scenario Provides multiple levels of protection with basic and advanced modes 4 2006 Corporation. All rights reserved.

Security Management secure usable affordable 5 Adapted from Jesper M. Johansson, Security Management, TechNet 2006 Corporation. All rights reserved.

BitLocker Key Points BitLocker in its basic mode provides a higher-level of data security with no additional security burden on the user BitLocker provides a range of options that allows customers to configure BitLocker for their security needs BitLocker should be deployed on platforms that have the Designed for Windows logo 6 2006 Corporation. All rights reserved.

Presentation Outline BitLocker Introduction BitLocker Technical Highlights Pen Testing BitLocker Top Threats Part 1 (basic mode) Top Threats Part 2 (advanced modes) Summary Questions (at the end, please) 7 2006 Corporation. All rights reserved.

Trusted Platform Module v1.2 BitLocker uses TPM v1.2 (not v1.1) Similar to the functions and security properties of Smart Cards Fastened onto motherboard Platform Configuration Registers (PCRs) Can have Tamper Resistance / Reaction / Evidence Trusted Computing Group (TCG) specification BitLocker can be used without TPM But this mode does not include BitLocker s pre-os integrity validation 8 2006 Corporation. All rights reserved.

BitLocker Modes Basic TPM Advanced TPM + PIN TPM + USB Dongle USB Dongle 9 2006 Corporation. All rights reserved.

Trusted Computing Base (TCB) The totality of protection mechanisms within a computer system, including hardware, firmware, and software, the combination of which is responsible for enforcing a security policy. [INFOSEC glossary] BitLocker s use of a TCB: Trusted identification of code and data loaded during boot Foundation that OS builds on OS Code Integrity x64 platforms: digital signatures for kernel-mode software 10 2006 Corporation. All rights reserved.

TCB Validation TPM s Platform Configuration Registers (PCRs) M M M M M: Measurement MBR: Master Boot Record Boot Mgr: Boot Manager 11 2006 Corporation. All rights reserved.

Presentation Outline BitLocker Introduction BitLocker Technical Highlights Pen Testing BitLocker Top Threats Part 1 (basic mode) Top Threats Part 2 (advanced modes) Summary Questions (at the end, please) 12 2006 Corporation. All rights reserved.

Adversary Objectives Read plaintext data off of the disk Gain access to encryption keys Gain control of privileged threads 13 2006 Corporation. All rights reserved.

Physical Memory Ghosts: Warm Warm ghosting 1. Attacker boots system 2. Attacker warm reboots into OS which avoids destruction of RAM image 3. Attacker then can access ghost secrets in memory Mitigations: Platforms where BIOS clears memory on reboot BitLocker advanced modes 14 2006 Corporation. All rights reserved.

Physical Memory Ghosts: Cold Cold ghosting Physical memory cells may retain charge long enough to be copied Iceman attack Battery-backed DIMMs make this even easier Mitigations: BitLocker advanced modes 15 2006 Corporation. All rights reserved.

Cheap, Easy, & Distributable HW-oriented Attacks PCI bus exploit with repurposed PC Card device and DMA (direct memory access) e.g. CardBus DMA technique demoed by David Hulton at ShmooCon, 2006 laptop DMA Modified PC Card ram Mitigation: BitLocker advanced modes 16 2006 Corporation. All rights reserved.

Cheap, Easy, & Distributable HW-oriented Attacks Xbox v1-style attacks LPC bus, HyperTransport bus, etc. Hacking the Xbox, by Andrew bunnie Huang Mitigation: BitLocker advanced modes 17 2006 Corporation. All rights reserved.

Threats against the TCB Executing code-of-choice within the TCB Controlling the instruction pointer Potential pre-os component vulnerabilities (bootmgr, winload, winresume, etc.) Mitigation: MS Security Development Lifecycle Mitigation: BitLocker advanced modes 18 2006 Corporation. All rights reserved.

Threats against the TCB Core Root of Trust for Measurement (CRTM) is intended to be immutable portion of BIOS Attacking the CRTM Execute chosen-code in CRTM Control / prevent measurements Physically remove it Attack existing CRTM (e.g. buffer overrun) Attack secure update-mechanism to inject unauthorized code into CRTM Mitigation: BIOS meets BitLocker requirements Mitigation: BitLocker advanced modes 19 2006 Corporation. All rights reserved.

Ciphertext Manipulation Threats Attacker can alter disk sectors offline, which will subsequently be decrypted during boot AES-CBC allows attacker to make known deltas in the decrypted data These deltas could be used to alter the security posture of the stolen laptop Mitigation: AES-CBC + Diffuser Mitigation: BitLocker advanced modes 20 2006 Corporation. All rights reserved.

Encryption without Diffuser Encrypt with AES-CBC Decrypt with AES-CBC 21 2006 Corporation. All rights reserved.

Modification of AES-CBC Ciphertext Attacker flips a single bit in the ciphertext (0xf8 to 0xf9) Decrypt with AES-CBC One block randomized Known delta in next block 22 2006 Corporation. All rights reserved.

AES-CBC + Diffuser Attacker flips a single bit in ciphertext (0x58 to 0x59) Entire sector is randomized Decrypt with AES-CBC + Diffuser 23 2006 Corporation. All rights reserved.

Ciphertext Manipulation Threats 24 AES-CBC + Diffuser helps, but there are still threats Cost: randomize entire sector (512+ bytes) Result: limited control of where data changes occur Effects: denial of service critical services fail to load? AES-CBC 128 + Diffuser 128 is default mode of BitLocker Mitigation: BitLocker advanced modes 2006 Corporation. All rights reserved.

Presentation Outline BitLocker Introduction BitLocker Technical Highlights Pen Testing BitLocker Top Threats Part 1 (basic mode) Top Threats Part 2 (advanced modes) Summary Questions (at the end, please) 25 2006 Corporation. All rights reserved.

Advanced Mode: TPM + PIN M M M M M M M 1337 M M M M 1337 PIN 26 2006 Corporation. All rights reserved.

TPM + PIN Threats For unseal to succeed: TPM Authdata value correct TRUNC(SHA256(PIN), 20B) TPM PCR values correct Attack: Brute-force PIN Mitigation: TPM Anti-hammering: TPM Authdata failure lockout geometrically increases Mitigation: Use platforms that meet BitLocker requirements 27 2006 Corporation. All rights reserved.

TPM + PIN Key-wear Analysis Function keys used for input F1..F10 these are not commonly used Speculation: an adversary may be able to determine which keys occur in the PIN Mitigation: longer pins (via group policy), diverse pins; numeric keys will work on many keyboards 28 2006 Corporation. All rights reserved.

Boot Rootkits BitLocker detects boot rootkits installed offline BitLocker detects online boot rootkits that are BitLocker-unaware BitLocker does not protect against boot rootkits that are BitLocker-aware and travel through the OS. Mitigation: MS Security Development Lifecycle Mitigation: Windows Vista OS Security, Config, Best Practices 29 2006 Corporation. All rights reserved.

Multi-visit / Premeditated Attacks Attacker hobbles BitLocker protection prior to laptop loss or theft There are many advance-strikes Mitigations: Windows Vista OS Security, Best Practices 30 2006 Corporation. All rights reserved.

Cryptographic Threats 31 Diffuser is a new algorithm and implementation BitLocker s AES-CCM is a new implementation of the AES-CCM standard Correct use of cryptographic APIs, counters, IVs, nonces, etc. Chosen- & Known- plaintext threats Ciphertext modification threats Mitigations: MS SDL, internal crypto review & validation Mitigations: external crypto review & validation, Crypto 2006, FIPS, Common Criteria 2006 Corporation. All rights reserved.

Lost While Unlocked Device is found, stolen, or illicitly accessed after the authorized user has authenticated, but before the device reaches the off state Also known as One Chance attacks Physical Memory Threats Cheap, Easy, & Distributed HW-based Threats Mitigations: Best Practices, Group Policy for Hibernate 32 2006 Corporation. All rights reserved.

Data Remanence: Electromigration Relocation of metal atoms due to high current densities Detection: OEM ports Mechanical probing Focused ion beam devices Peter Gutmann, Data Remanence in Semiconductor Devices, August 2001 33 2006 Corporation. All rights reserved.

Presentation Outline BitLocker Introduction BitLocker Technical Highlights Pen Testing BitLocker Top Threats Part 1 (basic mode) Top Threats Part 2 (advanced modes) Summary Questions (at the end, please) 34 2006 Corporation. All rights reserved.

Pen Testing BitLocker: : The Team Team of several dedicated penetration engineers Collaborated with the Secure Windows Initiative (SWI) team Engagements with several external security vendors Engagements with many partners Engagements with security researchers 35 2006 Corporation. All rights reserved.

Pen Testing BitLocker : The Process Security Development Lifecycle (SDL) Threat Modeling / Threat Storming Component data flows Large feature spanning hardware and software Broad and deep analysis Security code review Software and hardware pentests Trust-boundary Fuzzing Automated Analysis Tools 36 2006 Corporation. All rights reserved.

Presentation Outline BitLocker Introduction BitLocker Technical Highlights Pen Testing BitLocker Top Threats Part 1 (basic mode) Top Threats Part 2 (advanced modes) Summary Questions (at the end, please) 37 2006 Corporation. All rights reserved.

Hardware platform is the new attack perimeter As some cracks are filled, other surfaces become interesting OS and Network are being hardened Data / Device mobility is prevalent The user and his devices have become the attack vectors Widely-deployed disk encryption will result in an increased attack effort against hardware Adapted from David Maynor, You are the Trojan!, ToorCon 7, 2005 38 2006 Corporation. All rights reserved.

BitLocker Key Points BitLocker in its basic mode provides a higher-level of data security with no additional security burden on the user BitLocker provides a range of options that allows customers to configure BitLocker for their security needs BitLocker should be deployed on platforms that have the Designed for Windows logo 39 2006 Corporation. All rights reserved.

More Information Trustworthy Computing http://www.microsoft.com/mscorp/twc BitLocker Questions e-mail bdeinfo[at]microsoft.com BitLocker Blog blogs.msdn.com/si_team Security Development Lifecycle (SDL) msdn.microsoft.com/security/sdl Trusted Computing Group (TCG) www.trustedcomputinggroup.org Windows Hardware & Driver Central (WHDC) www.microsoft.com/whdc 40 2006 Corporation. All rights reserved.

Thank you for attending. Questions? 2006 Corporation. All rights reserved. This presentation is for informational purposes only. makes no warranties, express or implied, in this summary. 2006 Corporation. All rights reserved.