Infosec Learning
13.1K subscribers
665 photos
43 videos
61 files
843 links
Building Future Gladiator and Biggest Consultants
Download Telegram
โค22๐Ÿ‘8
TPM + BitLocker
The Core Process: System Integrity First
BitLocker Encryption and Key Sealing: When you enable BitLocker with a TPM, the BitLocker software generates a Volume Master Key (VMK) used to encrypt the entire drive. This VMK is then encrypted and "sealed" to the TPM chip. This sealing process binds the VMK to a specific, trusted state of the computer. This trusted state is defined by a set of cryptographic measurements stored in the TPM's Platform Configuration Registers (PCRs). These PCRs are hashes of critical components like the BIOS, bootloader, and other low-level software.

The Automated Boot Process (TPM-Only Mode): In the most common and user-transparent scenario (TPM-only mode), the user's role is minimal.
When the computer boots, the firmware and bootloader perform a series of checks.
During these checks, the TPM continuously measures the integrity of each component.
The TPM then compares the current PCR values to the "sealed" values from when BitLocker was enabled.
If the PCRs match, the TPM concludes that the system has not been tampered with. It then automatically "unseals" and releases the VMK to the operating system. The user sees a normal boot-up, and the process is completely transparent. The user's credential (e.g., their Windows login password) is not needed to unlock the drive itself; it's only needed to log into their Windows user account.


Where the User's Role Comes In: The "Additional Authentication" Methods
The TPM-only mode is highly secure against offline attacks and boot-level tampering, but it's not foolproof. An attacker could potentially bypass it if they get access to the unsealed key while the system is running. To add a layer of human-based authentication, BitLocker offers additional "protectors" that require user interaction. These are used in addition to the TPM's integrity checks.

TPM + PIN: This is a very popular and secure method. The BitLocker key is sealed to the TPM and is protected by a Personal Identification Number (PIN).

When the system boots, the user is prompted to enter a PIN before the operating system loads.

The TPM uses the PIN to authenticate the user.

Only if the PIN is correct, AND the TPM's integrity checks pass (the PCRs match), will the TPM release the decryption key. This adds a crucial "something you know" factor.

TPM + Startup Key: This option uses a physical device, typically a USB flash drive, as a key.

The BitLocker key is sealed to the TPM, and part of the key is stored on the USB drive.

During boot-up, the user must insert the USB drive.

The TPM's integrity checks must still pass.

The system then uses the data from the USB drive to unseal the key from the TPM. This adds a "something you have" factor.

TPM + PIN + Startup Key: This provides the highest level of security, combining all three factors: "something you are" (the trusted state of the hardware), "something you know" (the PIN), and "something you have" (the USB key). All three conditions must be met for the TPM to release the ke
๐Ÿ‘9
๐‘น๐’†๐’Ž๐’Š๐’๐’…๐’†๐’“ - ๐Ÿ-๐‘ฏ๐’๐’–๐’“ ๐‘ป๐’ ๐‘ฎ๐’ ๐ŸŽ‰๐ŸŽ‰

We're thrilled to have ๐๐ซ๐š๐›๐ก ๐๐š๐ข๐ซ leading an insightful session on:

โณ Free Training : ๐ŸŽฏ ๐€๐ˆ ๐†๐จ๐ฏ๐ž๐ซ๐ง๐š๐ง๐œ๐ž ๐Œ๐š๐ฌ๐ญ๐ž๐ซ๐œ๐ฅ๐š๐ฌ๐ฌ: ๐€๐ซ๐œ๐ก๐ข๐ญ๐ž๐œ๐ญ๐ข๐ง๐  ๐‘๐ž๐ฌ๐ฉ๐จ๐ง๐ฌ๐ข๐›๐ฅ๐ž ๐€๐ˆ ๐’๐ฒ๐ฌ๐ญ๐ž๐ฆ๐ฌ
๐Ÿ—“ Date : 17 Jul (Thu)
๐Ÿ•’ Time : 07:00 โ€“ 09:00 PM (IST)

SPEAKER: Prabh Nair

๐Ÿ“ Location: Live on ZOOM

Join Webinar
๐Ÿ”— ๐‘พ๐’†๐’ƒ๐’Š๐’๐’‚๐’“ ๐’๐’Š๐’๐’Œ: https://us06web.zoom.us/j/88912556760?pwd=rBxKbLeioEL82FbzHUuYJd4z86KqcK.1

๐Ÿ‘‰ Agenda for the Masterclass:

โœ”๏ธ Foundations of AI Architecture
โœ”๏ธ Understanding Different Layers of AI Systems
โœ”๏ธ Embedding Ethics into AI Systems
โœ”๏ธ Governance by Design: Key Decision Points



๐Ÿšฉ Why Attend This Masterclass ๐Ÿšฉ
โœ”๏ธ Get 2 CPE Certificate
โœ”๏ธ Learn from Industry Experts
โœ”๏ธ FREE Career Guidance & Mentorship

Happy Learning :)
โค4๐Ÿ‘3
โค7๐Ÿ‘7
โค9
Five years ago I wrote one goal on a sticky note: โ€œHost a podcast with Dr. Eric Cole, Cybersecurity Expert .That dream spoke back through my microphone. The mentor whose books lit my path to the CISO chair now sat across from me, sharing wisdom in real time. Manifestation only works when you back it with relentless learning and actionโ€”this moment proves it.
๐Ÿ‘32โค15๐Ÿ‘12๐Ÿ”ฅ7๐Ÿฅฐ1
๐Ÿ‘18โค6๐Ÿ‘1
โค11
๐Ÿ”ฅ1
โค7๐Ÿ‘5๐Ÿ˜3๐Ÿ‘1
๐•๐ž๐ซ๐ฒ ๐ˆ๐ฆ๐ฉ๐จ๐ซ๐ญ๐š๐ง๐ญ ๐Ÿ๐จ๐ซ ๐Ž๐’๐‚๐ ๐š๐ง๐ ๐‚๐ˆ๐’๐’๐ ๐„๐ฑ๐š๐ฆ

Silver Ticket and Golden Ticket attacks in Kerberos authentication โ€” two advanced Post-Exploitation techniques commonly seen in Windows domain compromises.

๐…๐จ๐ซ๐ ๐ž๐ = Service account's NTLM hash (e.g., MSSQL, CIFS)

Golden Ticket: Attacker has full control โ€” can create fake domain admins, access any system, impersonate anyone.

๐…๐จ๐ซ๐ ๐ž๐ = Using KRBTGT account's NTLM hash

Silver Ticket: Attacker only wants access to a file share or MSSQL DB, and creates a forged TGS for that service
โค8๐Ÿ‘2๐Ÿ‘2
โค5๐Ÿ‘3