Rambling on the Private Data Security

Slides:



Advertisements
Similar presentations
Secure Storage.
Advertisements

Encrypting stored data
Microsoft ® Official Course First Look Clinic Overview of Windows 8 By Ragowo Riantory, S.Kom, MCP.
Rodney Buike IT Pro Advisor, Microsoft Canada
Vpn-info.com.
BitLocker™ Drive Encryption A look under the covers Steve Lamb Technical Security Advisor, Microsoft UK
Securing. Agenda  Hard Drive Encryption  User Account Permissions  Root Level Access  Firewall Protection  Malware Protection.
Hardware Security: Trusted Platform Module Amir Houmansadr CS660: Advanced Information Assurance Spring 2015 Content may be borrowed from other resources.
BitLocker: deep details, improvements and benifits
Configuring Windows Vista Security Chapter 3. IE7 Pop-up Blocker Pop-up Blocker prevents annoying and sometimes unsafe pop-ups from web sites Can block.
Trusted Computing Initiative Beyond trustworthy. Trusted Computing  Five Key Concepts >Endorsement Key >Secure Input and Output >Memory Curtain / Protected.
Iron Key and Portable Drive Security Zakary Littlefield.
SEC316: BitLocker™ Drive Encryption
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture Three.
Computer Forensics Principles and Practices by Volonino, Anzaldua, and Godwin Chapter 6: Operating Systems and Data Transmission Basics for Digital Investigations.
BitLocker™ Drive Encryption Hardware Enhanced Data Protection
Mobility for the Enterprise
MDOP 2010: Diagnostic and Recovery Toolset (DaRT) Speaker Fabrizio Grossi
1 Chapter Overview Managing Compression Managing Disk Quotas Increasing Security with EFS Using Disk Defragmenter, Check Disk, and Disk Cleanup.
File System and Full Volume Encryption Sachin Patel CSE 590TU 3/9/2006.
Secure Startup Hardware-Enhanced Security Peter Biddle Product Unit Manager Windows Security Microsoft Corporation Stacy Stonich Program Manager Windows.
Virtual techdays Desktop Security with Windows 7 AppLocker & BitLocker to Go Aviraj Ajgekar│ Technology Evangelist │Microsoft Corporation Blog:
Mass Storage Media Locking By Curtis E. Stevens WD.
MCTS Guide to Microsoft Windows 7 Chapter 7 Windows 7 Security Features.
®® Microsoft Windows 7 for Power Users Tutorial 5 Comparing Windows 7 File Systems.
Court IT Issues Windows XP Problem April 8, 2014 Microsoft Ends Security Updates April 9, 2014 XP Computers will contract an OS Infection as soon.
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 6 Today’s Windows Windows Vista and Windows 7 McGraw-Hill.
Fall 2011 Nassau Community College ITE153 – Operating Systems Session 14 Windows XP Professional 1.
Microsoft ® Official Course Module 8 Securing Windows 8 Desktops.
Week #7 Objectives: Secure Windows 7 Desktop
Troubleshooting Windows Vista Security Chapter 4.
PC Maintenance: Preparing for A+ Certification Chapter 10: Introduction to Disk Storage.
MCTS Guide to Microsoft Windows Vista Chapter 4 Managing Disks.
File System Management File system management encompasses the provision of a way to store your data in a computer, as well as a way for you to find and.
Windows Operating System Internals - by David A. Solomon and Mark E. Russinovich with Andreas Polze Unit OS8: File System 8.3. Encrypting File System Security.
Cosc 4765 Trusted Platform Module. What is TPM The TPM hardware along with its supporting software and firmware provides the platform root of trust. –It.
Module 3 Configuring File Access and Printers on Windows ® 7 Clients.
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 7 Windows 7 Security Features.
Trusted Computing and the Trusted Platform Module Bruce Maggs (with some slides from Bryan Parno)
(ITI310) By Eng. BASSEM ALSAID SESSION 2: Server Configuration & Administration Notes SAT 31-Oct-2015.
Lecture 18 Windows – NT File System (NTFS)
Module 5: Configuring and Managing File Systems. Overview Working with File Systems Managing Data Compression Securing Data by Using EFS.
Trusted Computing and the Trusted Platform Module Bruce Maggs (with some slides from Bryan Parno)
Understand Encryption LESSON 2.5_A Security Fundamentals.
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 6 Today’s Windows Windows Vista and Windows 7 McGraw-Hill.
Lesson 18: Configuring Security for Mobile Devices MOAC : Configuring Windows 8.1.
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 7 Windows 7 Security Features.
Hands-On Microsoft Windows Server 2008 Chapter 7 Configuring and Managing Data Storage.
What is BitLocker and How Does It Work? Steve Lamb IT Pro Evangelist, Microsoft Ltd
WELCOME. Skills and Techniques - Session 2 Skills and Techniques Booting from Windows 8.1 and Windows 10 devices.
Using Mobile Computers Lesson 12. Objectives Understand wireless security Configure wireless networking Use Windows mobility controls Synchronize data.
Windows Vista Configuration MCTS : NTFS Security Features and File Sharing.
Systems Architecture Microsoft BitLocker -> securing data on mobile devices Johannes Marotzke
UNM Encryption Services in Development
Configuring Encryption and Advanced Auditing
Presented by Kartik Patel
Trusted Computing and the Trusted Platform Module
Hardware security: The use of a Trusted Platform Module
Trusted Computing and the Trusted Platform Module
תרגול 9 – Windows Security
Building hardware-based security with a Trusted Platform Module (TPM)
Hacking Hardware Some materials adapted from Sam Bowne.
TPM, UEFI, Trusted Boot, Secure Boot
The bios.
Bruce Maggs (with some slides from Bryan Parno)
“Encryption threatens to lead all of us to a very dark place.”
Bruce Maggs (with some slides from Bryan Parno)
What is an operating system An operating system is the most important software that runs on a computer. It manages the computer's memory and processes,
Presentation transcript:

Rambling on the Private Data Security Sun Bing taoshaixiaoyao@hotmail.com Syscan’08 Hong Kong China 30th May 2008

Preface Nowadays “Private Data Security” has become a very hot topic, especially after the HK entertainment circles celebrity pornogate scandal, so it’s necessary to provide ordinary computer users with knowledges and tools to protect their private data. A random talk on some “Data Security” related topics, which will mainly focus on the following subjects: Harddisk Lock Password EFS vs. Windows Vista Bitlocker WaterBox Software (Information Leakage Prevention) Harddisk Protection/Recovery Software/Card

Harddisk Lock Password ATA Security Mode Feature Set Abusing the Security Feature Set Harddisk Lock BIOS Configuration of Dell Latitude D620 Laptop Cracking the Harddisk Lock Password

ATA Security Mode Feature Set A password system that restricts access to user data stored on a device. In addition, access to some configuration capabilities is restricted. Password User Password Master Password Master Password Capability High Maximum Frozen Mode The Security Freeze Lock command prevents changes to all Security states until a following power-on reset or hardware reset, the purpose of this command is to prevent password setting attacks on the security system.

ATA Security Mode Feature Set (Cont) Commands Security Set Password Security Unlock (requires a password) Security Erase Prepare Security Erase Unit (requires a password) Security Freeze Lock Security Disable Password (requires a password) Password Rules See Table 6 Password Attempt Counter Counter: set to 5 after a power-on or hardware reset PasswordAttemptCounterExceeded

Password Rules

Security States

Security State Transitions

Security State Transitions

Abusing the Security Feature Set However the current BIOS version of most computers have no or only partial supports of this new security mode feature, which would be a very severe security hole that is exploitable by a malware to lock the hard disk with password stealthily to prevent any further hard disk access after the next power-off. In such a circumstance, to prevent the “Security Mode Feature Set” from being abused, a third-party pre-boot software is needed, as the format of either a BIOS extension or a bootable CD, which will issue the ATA command “Security Freeze Lock” to the ATA controller/drive to freeze all security settings until the next cold boot.

Dell D620 HD PW BIOS Configuration

Cracking the Harddisk Lock Password The harddisk will read the firmware area during the power-on process and determine whether it was locked or not, if locked then any other operation is not allowed before unlocking it with a correct password, since the passwords are stored in the negative tracks of the harddisk (a.k.a, firmware area) other than the drive circuit, it can’t be cracked by simply changing the PCB. It is said that someone can break this password protection by using the combination of PCB (Print Circuit Board) hot-swap and the supports of some professional harddisk repair tools (MHDD or PC3000 etc).

EFS vs. Windows Vista Bitlocker EFS Introduction EFS Cracking Windows Vista Bitlocker Introduction TPM Introduction TPM Security Issues

EFS Introduction EFS: Encrypted File System Important Keys Used FEK: File Encryption Key (DESX, AES, or 3DES) User’s Public/Private Key Pair (RSA) User’s Master Key (64 bytes) A Key Derived From User’s Password (3DES) Components Involved EFS & NTFS Driver KSecDD Lsass (Lsasrv) CSP

EFS Architecture

EFS DDF & DRF

EFS Cracking The Basic Concept of EFS Cracking: User’s Password  Derived Key  Master Key  Private Key  FEK  File Data Plaintext Detailed Cracking Steps: Get the user’s password by SAM attacking. (pwdump, L0pht Crack etc) Compute the derived key based on the user’s password. Decrypt the master key. (%UserProfile%\Application Data\Microsoft\Protect\SID ) Decrypt the private key. (%UserProfile%\Application Data\Microsoft\Crypto\RSA\SID) Decrypt the FEK. Decrypt the file data.

Windows Vista Bitlocker Introduction Full drive volume encryption. Integrity checking of early boot components. Important Keys/Passwords Used: FVEK: Full Volume Encryption Key VMK: Volume Master Key PIN: Personal Identification Number Clear Key Restore Key/Password Startup Key System Requirements: TPM v1.21 v1.2 TCG-compliant BIOS USB Mass Storage Device Class supports At least 2 volumes (OS/Boot & System Volume)

Bitlocker Architecture

Encryption Keys In Bitlocker

Bitlocker Drive Encryption-Enabled Volume With TPM Protection

Bitlocker Drive Encryption-Enabled Volume With Enhanced Protection

TPM Introduction TPM: Trusted Platform Module TPM Terminologies Protected capabilities Integrity measurement Integrity reporting TPM Terminologies TBB: Trust Building Block CRTM: Core Root of Trust Measurement (BIOS Bootblock) PCRs: Platform Configuration Registers Extend operation: PCR[n] <-- SHA-1 (PCR[n] + measured data) TPM BIOS Driver (MA/MP)

TPM Architecture

TPM Components Architecture

PCRs Usages Summary

Dell D620 TPM BIOS Configuration

Dell D620 TPM BIOS Configuration

TPM Security Issues Three Conditions That Make the Chain of Hashes Trustyworthy: The first code running and extending PCRs after a platform reset (SRTM) is trustworthy and cannot be replaced. The PCRs are not resetable without passing control to trusted code. The chain is contiguous. There is no code in between that is executed but not hashed. TPM Security: Bootloader bugs (Violates condition 3) TPM reset (Violates condition 2) BIOS attack (Violates condition 1, CRTM and TPM MP Driver patchable) TPMKit? (BlackHat USA 2007)

TPM BIOS MP Driver

TPM BIOS Driver Header

MPTPMTransmit Prototype

Waterbox & Harddisk Protection/Recovery Software Waterbox Software Introduction Waterbox Software Bypassing Harddisk Protection/Recovery Software/Card Introduction Harddisk Protection/Recovery Software Penetration

Waterbox Software Introduction What Is A Waterbox Software? Information leakage Prevention, a.k.a. Document Security Management (Protection) System. Popular Waterbox Softwares FileSECURE (AirZip) FSD/FSF/FSN/Wrapsody (FASOO) FD-DSM (Frontier Technology) CDG (E-SAFENET) InfoGuard (UNNOO) NET-LOCK (Sagetech) Implementation Technique Categories Peripheral device & network protocol control File & directory encryption File format convertion Remote file storage Information filter Application plugin Kernel mode real-time transparent file encryption/decryption

Waterbox Software Bypassing The Theory of Real-time Transparent File Encryption/Decryption: The file data are encrypted on disk, and the Waterbox will only decrypt/encrypt the file read/write requests that are issued within some specified process contexts, such as Winword.exe… Implementation Methods User Mode: File Win32/Native API hooking (Including Memory Mapping functions) Kernel Mode: FS Filter driver Bypassing Steps: Inject a DLL into the process which can make the Waterbox decrypt files. Open and read the desired encrypted files. Pass the decrypted file contents to another process via shared memory. Write the received file data to disk within that process.

Harddisk Protection/Recovery Software/Card Introduction What Can A Harddisk Protection/Recovery Software/Card Do? Any modification made on the protected harddisk will be restored automatically upon the next system boot, many internet bar install this kind of softwares to prevent their PCs from being ruined by customers. Popular Harddisk Protection/Recovery Softwares DeepFreeze (Faronics) PowerShadow PowerUser/PowerServer Returnil Virtual System (RVS) Sandboxie

Harddisk Protection/Recovery Software Penetration The Theory of Harddisk Protection/Recovery: The disk access requests made on the protected disk partitions are intercepted and redirected to other disk locations, for example a hidden reserved disk partition. Implementation Methods: DOS time: PCI/ISA Option ROM, intercept BIOS int13h. Windows: Disk Filter driver, attach on DR0 device object. Penetration Techniques (Used by Machine Dog virus) Detach the filter device object that was stacked on DR0. Create a virtual disk volume object. Passthrough instruction (DeviceIoControl). Direct port I/O.

Thanks For Watching! Question & Discussion Time