Google, IBM & Microsoft Certificates — All in One Plan
Build the Finance Skills That Lead to Promotions — Not Just Certificates
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore a comprehensive security research presentation that reveals critical vulnerabilities in Windows BitLocker encryption through the Windows Recovery Environment (WinRE). Discover how researchers identified multiple zero-day vulnerabilities in WinRE that can be exploited to bypass BitLocker's full volume encryption and extract protected data from physically accessible devices. Learn about the WinRE architecture, understand the attack surfaces introduced when BitLocker recovery features were implemented, and examine the methodology used to research and exploit these security weaknesses. Gain insights into the development of functional exploits that demonstrate several different methods for circumventing BitLocker protection, and understand Microsoft's response to these findings including their approach to hardening WinRE to strengthen BitLocker's overall security posture.
Syllabus
DEF CON 33 -BitUnlocker: Leverage Windows Recovery to Extract BitLocker Secrets - Leviev, Ben Simon
Taught by
DEFCONConference