Flipper/BadUSB/emptythevoid-BadUSB/bitlocker/readme.md
2024-09-06 13:27:37 -07:00

26 lines
1.3 KiB
Markdown

# Research into manipulating Bitlocker using BadUSB
All scripts require the current user to have administrative permissions on Windows.
bitlocker_disable.txt -- Immediately suspends Bitlocker on C:. Does not remove it
bitlocker_turn_off.txt -- Turns off Bitlocker and begins decryption of C:. When decryption is complete, all key protectors are removed.
bitlocker_encrypt_password.txt:
Uses base64 to dump a registry.pol into Windows to allow tablets (Surface Pro, etc) to have pre-boot authentication enabled. Then perform a gpupdate /force (without this, Bitlocker will fail to enable with just a password when it detects the computer is a tablet, aka "slate")
If Bitlocker is already enabled, all key protectors are removed
Enable Bitlocker on C: and skip hardware test. If Bitlocker wasn't previously enabled, it gets turned on and drive begins encrypting
Remove the default TPM key protector that gets created on new Bitlocker enabled C:
Manually set an attacker-controlled password as the only key protector. Must be at least 8 characters
Enable the new password protector immediately.
Optional: Reboot after a pre-defined delay or immediately, clear history, close window.'
On next boot, Windows will require the attacker-controlled password to boot, and no recovery key will exist.