penetration testing windows vistatm bitlocker drive encryption 2 - douglas maciver... · bitlocker...

41
Microsoft Microsoft Windows Windows Vista Vista TM TM © 2006 Microsoft Corporation. All rights reserved. Penetration Testing Windows Vista TM BitLocker TM Drive Encryption Penetration Testing Penetration Testing Windows Windows Vista Vista TM TM BitLocker BitLocker TM TM Drive Encryption Drive Encryption Douglas MacIver Penetration Engineer System Integrity Group, Microsoft Corporation Hack In The Box 2006/09/21

Upload: others

Post on 05-Sep-2019

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Penetration Testing Windows VistaTM BitLocker Drive Encryption 2 - Douglas MacIver... · BitLocker in its basic mode provides a higher-level of data security with no additional security

MicrosoftMicrosoftWindows Windows VistaVistaTMTM © 2006 Microsoft Corporation. All rights reserved.

Penetration Testing Windows VistaTM

BitLockerTM Drive Encryption

Penetration Testing Penetration Testing Windows Windows VistaVistaTMTM

BitLockerBitLockerTMTM Drive EncryptionDrive EncryptionDouglas MacIver

Penetration EngineerSystem Integrity Group, Microsoft Corporation

Hack In The Box 2006/09/21

Page 2: Penetration Testing Windows VistaTM BitLocker Drive Encryption 2 - Douglas MacIver... · BitLocker in its basic mode provides a higher-level of data security with no additional security

© 2006 Microsoft Corporation. All rights reserved.MicrosoftMicrosoftWindows Windows VistaVistaTMTM2

Trustworthy ComputingTrustworthy ComputingTrustworthy Computing“The security of our customers' computers and networks is a top priority, and we are committed to building software and services to better help protect our customers and the industry.”

Microsoft

Threats discussed in this presentation are not secretsOur customers’ adversaries are aware of these attack vectorsOur customers need this information too, so that they may make informed decisions about the level of data protection that they need

Page 3: Penetration Testing Windows VistaTM BitLocker Drive Encryption 2 - Douglas MacIver... · BitLocker in its basic mode provides a higher-level of data security with no additional security

© 2006 Microsoft Corporation. All rights reserved.MicrosoftMicrosoftWindows Windows VistaVistaTMTM

Presentation OutlinePresentation OutlinePresentation OutlineBitLocker IntroductionBitLocker Technical HighlightsPen Testing BitLockerTop Threats Part 1 (basic mode)Top Threats Part 2 (advanced modes)Summary

Questions (at the end, please)

3

Page 4: Penetration Testing Windows VistaTM BitLocker Drive Encryption 2 - Douglas MacIver... · BitLocker in its basic mode provides a higher-level of data security with no additional security

© 2006 Microsoft Corporation. All rights reserved.MicrosoftMicrosoftWindows Windows VistaVistaTMTM4

BitLocker Drive Encryption: Feature IntroductionBitLockerBitLocker Drive Encryption: Drive Encryption: Feature IntroductionFeature Introduction

Data ConfidentialityEncrypts the OS volumeSecure decommissioning

System IntegrityCryptographically validates pre-OS

componentsThe lost or stolen laptop is the primary threat

scenario Provides multiple levels of protection with basic

and advanced modes

Page 5: Penetration Testing Windows VistaTM BitLocker Drive Encryption 2 - Douglas MacIver... · BitLocker in its basic mode provides a higher-level of data security with no additional security

© 2006 Microsoft Corporation. All rights reserved.MicrosoftMicrosoftWindows Windows VistaVistaTMTM5

secure

usable affordable

Adapted from Jesper M. Johansson, “Security Management”, Microsoft TechNet

Security ManagementSecurity ManagementSecurity Management

Page 6: Penetration Testing Windows VistaTM BitLocker Drive Encryption 2 - Douglas MacIver... · BitLocker in its basic mode provides a higher-level of data security with no additional security

© 2006 Microsoft Corporation. All rights reserved.MicrosoftMicrosoftWindows Windows VistaVistaTMTM

BitLocker Key PointsBitLockerBitLocker Key PointsKey PointsBitLocker in its basic mode provides a higher-level of data security with no additional security burden on the user

BitLocker provides a range of options that allows customers to configure BitLocker for their security needs

BitLocker should be deployed on platforms that have the “Designed for Windows” logo

6

Page 7: Penetration Testing Windows VistaTM BitLocker Drive Encryption 2 - Douglas MacIver... · BitLocker in its basic mode provides a higher-level of data security with no additional security

© 2006 Microsoft Corporation. All rights reserved.MicrosoftMicrosoftWindows Windows VistaVistaTMTM

Presentation OutlinePresentation OutlinePresentation OutlineBitLocker IntroductionBitLocker Technical HighlightsPen Testing BitLockerTop Threats Part 1 (basic mode)Top Threats Part 2 (advanced modes)Summary

Questions (at the end, please)

7

Page 8: Penetration Testing Windows VistaTM BitLocker Drive Encryption 2 - Douglas MacIver... · BitLocker in its basic mode provides a higher-level of data security with no additional security

© 2006 Microsoft Corporation. All rights reserved.MicrosoftMicrosoftWindows Windows VistaVistaTMTM

Trusted Platform Module v1.2Trusted Platform Module v1.2Trusted Platform Module v1.2BitLocker uses TPM v1.2 (not v1.1)

Similar to the functions and security properties of Smart CardsFastened onto motherboardPlatform Configuration Registers (PCRs)Can have Tamper Resistance / Reaction / EvidenceTrusted Computing Group (TCG) specification

BitLocker can be used without TPMBut this mode does not include BitLocker’s pre-OS

integrity validation

8

Page 9: Penetration Testing Windows VistaTM BitLocker Drive Encryption 2 - Douglas MacIver... · BitLocker in its basic mode provides a higher-level of data security with no additional security

© 2006 Microsoft Corporation. All rights reserved.MicrosoftMicrosoftWindows Windows VistaVistaTMTM

BitLocker ModesBitLockerBitLocker ModesModesBasic

TPM

AdvancedTPM + PINTPM + USB DongleUSB Dongle

9

Page 10: Penetration Testing Windows VistaTM BitLocker Drive Encryption 2 - Douglas MacIver... · BitLocker in its basic mode provides a higher-level of data security with no additional security

© 2006 Microsoft Corporation. All rights reserved.MicrosoftMicrosoftWindows Windows VistaVistaTMTM

Trusted Computing Base (TCB)Trusted Computing Base (TCB)Trusted Computing Base (TCB)

BitLocker’s use of a TCB:Trusted identification of code and data loaded

during bootFoundation that OS builds on

OS Code Integrityx64 platforms: digital signatures for kernel-mode

software

10

“The totality of protection mechanisms within a computer system, including hardware, firmware, and software, the combination of which is responsible for enforcing a security policy.” [INFOSEC glossary]

Page 11: Penetration Testing Windows VistaTM BitLocker Drive Encryption 2 - Douglas MacIver... · BitLocker in its basic mode provides a higher-level of data security with no additional security

© 2006 Microsoft Corporation. All rights reserved.MicrosoftMicrosoftWindows Windows VistaVistaTMTM

TCB ValidationTCB ValidationTCB Validation

11

MMMMM M M MTPM’s Platform Configuration Registers (PCRs)

M: MeasurementMBR: Master Boot RecordBoot Mgr: Boot Manager

Page 12: Penetration Testing Windows VistaTM BitLocker Drive Encryption 2 - Douglas MacIver... · BitLocker in its basic mode provides a higher-level of data security with no additional security

© 2006 Microsoft Corporation. All rights reserved.MicrosoftMicrosoftWindows Windows VistaVistaTMTM

Presentation OutlinePresentation OutlinePresentation OutlineBitLocker IntroductionBitLocker Technical HighlightsPen Testing BitLockerTop Threats Part 1 (basic mode)Top Threats Part 2 (advanced modes)Summary

Questions (at the end, please)

12

Page 13: Penetration Testing Windows VistaTM BitLocker Drive Encryption 2 - Douglas MacIver... · BitLocker in its basic mode provides a higher-level of data security with no additional security

© 2006 Microsoft Corporation. All rights reserved.MicrosoftMicrosoftWindows Windows VistaVistaTMTM

Adversary ObjectivesAdversary ObjectivesAdversary Objectives

Read plaintext data off of the diskGain access to encryption keysGain control of privileged threads

13

Page 14: Penetration Testing Windows VistaTM BitLocker Drive Encryption 2 - Douglas MacIver... · BitLocker in its basic mode provides a higher-level of data security with no additional security

© 2006 Microsoft Corporation. All rights reserved.MicrosoftMicrosoftWindows Windows VistaVistaTMTM14

Physical Memory Ghosts: WarmPhysical Memory Ghosts: WarmPhysical Memory Ghosts: WarmWarm ghosting 1. Attacker boots system2. Attacker warm reboots into OS which avoids

destruction of RAM image 3. Attacker then can access ghost secrets in

memoryMitigations:

Platforms where BIOS clears memory on rebootBitLocker advanced modes

Page 15: Penetration Testing Windows VistaTM BitLocker Drive Encryption 2 - Douglas MacIver... · BitLocker in its basic mode provides a higher-level of data security with no additional security

© 2006 Microsoft Corporation. All rights reserved.MicrosoftMicrosoftWindows Windows VistaVistaTMTM15

Physical Memory Ghosts: ColdPhysical Memory Ghosts: ColdPhysical Memory Ghosts: ColdCold ghosting

Physical memory cells may retain charge long enough to be copiedIceman attack

Battery-backed DIMMs make this even easierMitigations: BitLocker advanced modes

Page 16: Penetration Testing Windows VistaTM BitLocker Drive Encryption 2 - Douglas MacIver... · BitLocker in its basic mode provides a higher-level of data security with no additional security

© 2006 Microsoft Corporation. All rights reserved.MicrosoftMicrosoftWindows Windows VistaVistaTMTM16

Cheap, Easy, & Distributable HW-oriented AttacksCheap, Easy, & Distributable Cheap, Easy, & Distributable HWHW--oriented Attacksoriented Attacks

PCI bus exploit with repurposed PC Card device and DMA (direct memory access)

e.g. CardBus DMA technique demoed by David Hulton at ShmooCon, 2006

laptop

Modified PC Card

DMA

ram

Mitigation: BitLocker advanced modes

Page 17: Penetration Testing Windows VistaTM BitLocker Drive Encryption 2 - Douglas MacIver... · BitLocker in its basic mode provides a higher-level of data security with no additional security

© 2006 Microsoft Corporation. All rights reserved.MicrosoftMicrosoftWindows Windows VistaVistaTMTM17

Cheap, Easy, & Distributable HW-oriented AttacksCheap, Easy, & Distributable Cheap, Easy, & Distributable HWHW--oriented Attacksoriented Attacks

Xbox v1-style attacksLPC bus, HyperTransport bus, etc.Hacking the Xbox, by Andrew “bunnie” Huang

Mitigation: BitLocker advanced modes

Page 18: Penetration Testing Windows VistaTM BitLocker Drive Encryption 2 - Douglas MacIver... · BitLocker in its basic mode provides a higher-level of data security with no additional security

© 2006 Microsoft Corporation. All rights reserved.MicrosoftMicrosoftWindows Windows VistaVistaTMTM18

Threats against the TCBThreats against the TCBThreats against the TCBExecuting code-of-choice within the TCB

Controlling the instruction pointerPotential pre-OS component vulnerabilities

(bootmgr, winload, winresume, etc.)

Mitigation: MS Security Development LifecycleMitigation: BitLocker advanced modes

Page 19: Penetration Testing Windows VistaTM BitLocker Drive Encryption 2 - Douglas MacIver... · BitLocker in its basic mode provides a higher-level of data security with no additional security

© 2006 Microsoft Corporation. All rights reserved.MicrosoftMicrosoftWindows Windows VistaVistaTMTM

Threats against the TCBThreats against the TCBCore Root of Trust for Measurement (CRTM) is intended to be ‘immutable’ portion of BIOSAttacking the CRTM

Execute chosen-code in CRTMControl / prevent measurementsPhysically remove itAttack existing CRTM (e.g. buffer overrun)Attack secure update-mechanism to inject unauthorized code into CRTM

Mitigation: BIOS meets BitLocker requirementsMitigation: BitLocker advanced modes

19

Page 20: Penetration Testing Windows VistaTM BitLocker Drive Encryption 2 - Douglas MacIver... · BitLocker in its basic mode provides a higher-level of data security with no additional security

© 2006 Microsoft Corporation. All rights reserved.MicrosoftMicrosoftWindows Windows VistaVistaTMTM20

Ciphertext Manipulation ThreatsCiphertextCiphertext Manipulation ThreatsManipulation ThreatsAttacker can alter disk sectors offline, which will

subsequently be decrypted during bootAES-CBC allows attacker to make known deltas

in the decrypted dataThese deltas could be used to alter the security

posture of the stolen laptop

Mitigation: AES-CBC + DiffuserMitigation: BitLocker advanced modes

Page 21: Penetration Testing Windows VistaTM BitLocker Drive Encryption 2 - Douglas MacIver... · BitLocker in its basic mode provides a higher-level of data security with no additional security

© 2006 Microsoft Corporation. All rights reserved.MicrosoftMicrosoftWindows Windows VistaVistaTMTM

Encrypt with AES-CBC

21

Encryption without DiffuserEncryption without DiffuserEncryption without Diffuser

Decrypt with AES-CBC

Page 22: Penetration Testing Windows VistaTM BitLocker Drive Encryption 2 - Douglas MacIver... · BitLocker in its basic mode provides a higher-level of data security with no additional security

© 2006 Microsoft Corporation. All rights reserved.MicrosoftMicrosoftWindows Windows VistaVistaTMTM22

Modification of AES-CBC CiphertextModification of AESModification of AES--CBC CBC CiphertextCiphertext

Decrypt with AES-CBC

One block randomized

Attacker flips a single bit in the ciphertext(0xf8 to 0xf9)

Known delta in next block

Page 23: Penetration Testing Windows VistaTM BitLocker Drive Encryption 2 - Douglas MacIver... · BitLocker in its basic mode provides a higher-level of data security with no additional security

© 2006 Microsoft Corporation. All rights reserved.MicrosoftMicrosoftWindows Windows VistaVistaTMTM

Attacker flips a single bit in ciphertext (0x58 to 0x59)

23

AES-CBC + DiffuserAESAES--CBC + DiffuserCBC + Diffuser

Decrypt with AES-CBC + Diffuser

Entire sector is randomized

Page 24: Penetration Testing Windows VistaTM BitLocker Drive Encryption 2 - Douglas MacIver... · BitLocker in its basic mode provides a higher-level of data security with no additional security

© 2006 Microsoft Corporation. All rights reserved.MicrosoftMicrosoftWindows Windows VistaVistaTMTM24

Ciphertext Manipulation ThreatsCiphertextCiphertext Manipulation ThreatsManipulation ThreatsAES-CBC + Diffuser helps, but there are still

threatsCost: randomize entire sector (512+ bytes)Result: limited control of where data changes

occurEffects:

denial of service critical services fail to load?

AES-CBC 128 + Diffuser 128 is default mode of BitLockerMitigation: BitLocker advanced modes

Page 25: Penetration Testing Windows VistaTM BitLocker Drive Encryption 2 - Douglas MacIver... · BitLocker in its basic mode provides a higher-level of data security with no additional security

© 2006 Microsoft Corporation. All rights reserved.MicrosoftMicrosoftWindows Windows VistaVistaTMTM

Presentation OutlinePresentation OutlinePresentation OutlineBitLocker IntroductionBitLocker Technical HighlightsPen Testing BitLockerTop Threats Part 1 (basic mode)Top Threats Part 2 (advanced modes)Summary

Questions (at the end, please)

25

Page 26: Penetration Testing Windows VistaTM BitLocker Drive Encryption 2 - Douglas MacIver... · BitLocker in its basic mode provides a higher-level of data security with no additional security

© 2006 Microsoft Corporation. All rights reserved.MicrosoftMicrosoftWindows Windows VistaVistaTMTM

Advanced Mode: TPM + PINAdvanced Mode: TPM + PINAdvanced Mode: TPM + PIN

26

M M MM

MMMMM M M M

1337

M M M

PIN13371337

Page 27: Penetration Testing Windows VistaTM BitLocker Drive Encryption 2 - Douglas MacIver... · BitLocker in its basic mode provides a higher-level of data security with no additional security

© 2006 Microsoft Corporation. All rights reserved.MicrosoftMicrosoftWindows Windows VistaVistaTMTM

TPM + PIN ThreatsTPM + PIN ThreatsTPM + PIN ThreatsFor ‘unseal’ to succeed:

TPM Authdata value correctTRUNC(SHA256(PIN), 20B)

TPM PCR values correctAttack: Brute-force PIN

Mitigation: TPM Anti-hammering: TPM Authdatafailure lockout geometrically increasesMitigation: Use platforms that meet BitLockerrequirements

27

Page 28: Penetration Testing Windows VistaTM BitLocker Drive Encryption 2 - Douglas MacIver... · BitLocker in its basic mode provides a higher-level of data security with no additional security

© 2006 Microsoft Corporation. All rights reserved.MicrosoftMicrosoftWindows Windows VistaVistaTMTM28

TPM + PIN Key-wear AnalysisTPM + PIN KeyTPM + PIN Key--wear Analysiswear AnalysisFunction keys used for input F1..F10… these are

not commonly usedSpeculation: an adversary may be able to

determine which keys occur in the PIN

Mitigation: longer pins (via group policy), diverse pins; numeric keys will work on many keyboards

Page 29: Penetration Testing Windows VistaTM BitLocker Drive Encryption 2 - Douglas MacIver... · BitLocker in its basic mode provides a higher-level of data security with no additional security

© 2006 Microsoft Corporation. All rights reserved.MicrosoftMicrosoftWindows Windows VistaVistaTMTM29

Boot RootkitsBoot Boot RootkitsRootkitsBitLocker detects boot rootkits installed offlineBitLocker detects online boot rootkits that are

BitLocker-unawareBitLocker does not protect against boot rootkits

that are BitLocker-aware and travel through the OS.

Mitigation: MS Security Development LifecycleMitigation: Windows Vista OS Security, Config,

Best Practices

Page 30: Penetration Testing Windows VistaTM BitLocker Drive Encryption 2 - Douglas MacIver... · BitLocker in its basic mode provides a higher-level of data security with no additional security

© 2006 Microsoft Corporation. All rights reserved.MicrosoftMicrosoftWindows Windows VistaVistaTMTM30

Multi-visit / Premeditated AttacksMultiMulti--visit / Premeditated Attacksvisit / Premeditated AttacksAttacker hobbles BitLocker protection prior to

laptop loss or theftThere are many advance-strikes

Mitigations: Windows Vista OS Security, Best Practices

Page 31: Penetration Testing Windows VistaTM BitLocker Drive Encryption 2 - Douglas MacIver... · BitLocker in its basic mode provides a higher-level of data security with no additional security

© 2006 Microsoft Corporation. All rights reserved.MicrosoftMicrosoftWindows Windows VistaVistaTMTM31

Cryptographic ThreatsCryptographic ThreatsCryptographic ThreatsDiffuser is a new algorithm and implementationBitLocker’s AES-CCM is a new implementation of

the AES-CCM standardCorrect use of cryptographic APIs, counters, IVs,

nonces, etc.Chosen- & Known- plaintext threatsCiphertext modification threatsMitigations: MS SDL, internal crypto review &

validationMitigations: external crypto review & validation,

Crypto 2006, FIPS, Common Criteria

Page 32: Penetration Testing Windows VistaTM BitLocker Drive Encryption 2 - Douglas MacIver... · BitLocker in its basic mode provides a higher-level of data security with no additional security

© 2006 Microsoft Corporation. All rights reserved.MicrosoftMicrosoftWindows Windows VistaVistaTMTM32

Lost While UnlockedLost While UnlockedLost While UnlockedDevice is found, stolen, or illicitly accessed after

the authorized user has authenticated, but before the device reaches the off stateAlso known as “One Chance” attacksPhysical Memory ThreatsCheap, Easy, & Distributed HW-based Threats

Mitigations: Best Practices, Group Policy for Hibernate

Page 33: Penetration Testing Windows VistaTM BitLocker Drive Encryption 2 - Douglas MacIver... · BitLocker in its basic mode provides a higher-level of data security with no additional security

© 2006 Microsoft Corporation. All rights reserved.MicrosoftMicrosoftWindows Windows VistaVistaTMTM

33

Data Remanence: ElectromigrationData Data RemanenceRemanence: : ElectromigrationElectromigrationRelocation of metal atoms due to high current densitiesDetection:

OEM portsMechanical

probingFocused ion

beam devices

Peter Gutmann, “Data Remanence in Semiconductor Devices”, August 2001

Page 34: Penetration Testing Windows VistaTM BitLocker Drive Encryption 2 - Douglas MacIver... · BitLocker in its basic mode provides a higher-level of data security with no additional security

© 2006 Microsoft Corporation. All rights reserved.MicrosoftMicrosoftWindows Windows VistaVistaTMTM

Presentation OutlinePresentation OutlinePresentation OutlineBitLocker IntroductionBitLocker Technical HighlightsPen Testing BitLockerTop Threats Part 1 (basic mode)Top Threats Part 2 (advanced modes)Summary

Questions (at the end, please)

34

Page 35: Penetration Testing Windows VistaTM BitLocker Drive Encryption 2 - Douglas MacIver... · BitLocker in its basic mode provides a higher-level of data security with no additional security

© 2006 Microsoft Corporation. All rights reserved.MicrosoftMicrosoftWindows Windows VistaVistaTMTM

Pen Testing BitLocker: The TeamPen Testing Pen Testing BitLockerBitLocker: The Team: The TeamTeam of several dedicated Microsoft penetration engineersCollaborated with the Microsoft Secure Windows Initiative (SWI) teamEngagements with several external security vendorsEngagements with many partnersEngagements with security researchers

35

Page 36: Penetration Testing Windows VistaTM BitLocker Drive Encryption 2 - Douglas MacIver... · BitLocker in its basic mode provides a higher-level of data security with no additional security

© 2006 Microsoft Corporation. All rights reserved.MicrosoftMicrosoftWindows Windows VistaVistaTMTM

Pen Testing BitLocker : The ProcessPen Testing Pen Testing BitLockerBitLocker : The Process: The ProcessMicrosoft Security Development Lifecycle (SDL)Threat Modeling / Threat StormingComponent data flowsLarge feature spanning hardware and softwareBroad and deep analysisSecurity code reviewSoftware and hardware pentestsTrust-boundary FuzzingAutomated Analysis Tools

36

Page 37: Penetration Testing Windows VistaTM BitLocker Drive Encryption 2 - Douglas MacIver... · BitLocker in its basic mode provides a higher-level of data security with no additional security

© 2006 Microsoft Corporation. All rights reserved.MicrosoftMicrosoftWindows Windows VistaVistaTMTM

Presentation OutlinePresentation OutlinePresentation OutlineBitLocker IntroductionBitLocker Technical HighlightsPen Testing BitLockerTop Threats Part 1 (basic mode)Top Threats Part 2 (advanced modes)Summary

Questions (at the end, please)

37

Page 38: Penetration Testing Windows VistaTM BitLocker Drive Encryption 2 - Douglas MacIver... · BitLocker in its basic mode provides a higher-level of data security with no additional security

© 2006 Microsoft Corporation. All rights reserved.MicrosoftMicrosoftWindows Windows VistaVistaTMTM38

Hardware platform is the new attack perimeterHardware platform is the new attack Hardware platform is the new attack perimeterperimeter

As some cracks are filled, other surfaces become interestingOS and Network are being hardenedData / Device mobility is prevalentThe user and his devices have become the attack

vectorsWidely-deployed disk encryption will result in an

increased attack effort against hardware

Adapted from David Maynor, “You are the Trojan!”, ToorCon 7, 2005

Page 39: Penetration Testing Windows VistaTM BitLocker Drive Encryption 2 - Douglas MacIver... · BitLocker in its basic mode provides a higher-level of data security with no additional security

© 2006 Microsoft Corporation. All rights reserved.MicrosoftMicrosoftWindows Windows VistaVistaTMTM

BitLocker Key PointsBitLockerBitLocker Key PointsKey PointsBitLocker in its basic mode provides a higher-level of data security with no additional security burden on the user

BitLocker provides a range of options that allows customers to configure BitLocker for their security needs

BitLocker should be deployed on platforms that have the “Designed for Windows” logo

39

Page 40: Penetration Testing Windows VistaTM BitLocker Drive Encryption 2 - Douglas MacIver... · BitLocker in its basic mode provides a higher-level of data security with no additional security

© 2006 Microsoft Corporation. All rights reserved.MicrosoftMicrosoftWindows Windows VistaVistaTMTM

More InformationMore InformationMore Information

40

Microsoft Trustworthy Computinghttp://www.microsoft.com/mscorp/twc

BitLocker™ Questionse-mail bdeinfo[at]microsoft.com

BitLocker™ Blogblogs.msdn.com/si_team

Microsoft Security Development Lifecycle (SDL)msdn.microsoft.com/security/sdl

Trusted Computing Group (TCG)www.trustedcomputinggroup.org

Windows Hardware & Driver Central (WHDC)www.microsoft.com/whdc

Page 41: Penetration Testing Windows VistaTM BitLocker Drive Encryption 2 - Douglas MacIver... · BitLocker in its basic mode provides a higher-level of data security with no additional security

MicrosoftMicrosoftWindows Windows VistaVistaTMTM © 2006 Microsoft Corporation. All rights reserved.

Thank you for attending.Thank you for attending.Thank you for attending.

Questions?Questions?

© 2006 Microsoft Corporation. All rights reserved.This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.