Overview
This course covers attacking and defending full disk encryption. The learning outcomes include understanding encryption deployment, breaking encryption, and implementing security measures such as preboot authentication and disabling DMA interfaces. The course teaches skills like forensics, memory verification, and managing encryption. The teaching method involves discussing real-world scenarios and practical strategies. The intended audience includes cybersecurity professionals, IT professionals, and individuals interested in data security.
Syllabus
Introduction
Overview
Management
Forensics
Memory
Verification
Encryption Deployment
Breaking Encryption
TwoStory Family
The Scenario
The Real Test
Breakthrough
What is the passphrase
User convenience setting
Full disk encryption failure
Physical access
Usability vs security
Preboot authentication
Disable DMA interfaces
Disable standby
Password resets
Backups
Independent Verification
Conclusions
Questions
Taught by
BSidesLV