Andreas Grasser

Results 26 comments of Andreas Grasser

Hi! As far as I understand, you were able to modify and extract the BCD file. One thing that helped me debugging the Boot process was to replace the boot...

I assume that booting fails for the same reason as in #13 that the computer does not trust third party CAs. It would probably still be possible to exploit the...

Oh wow, I did not notice that Martanne already implemented the WindowsPE method 😮

Hard to guess the issue here... Maybe the BitLocker partition was not decrypted by the bootmanager. Can you tell me something about the system configuration? Is this a virtual machine?

The needle "-FVE-FS-" does not really hint to BitLocker-Decryption being involved, I had a lot of unsuccessful Bitpixie attempts where the output looked similar to the one you provided. The...

The other exploits from the Wack0 repository would likely fit into a different project as they don't depend on PXE-boot :)

Do you mean the link https://snapshot.debian.org/archive/debian/20240716T023930Z/pool/main/g/grub-efi-amd64-signed/grub-efi-amd64-signed_1%2B2.12%2B5_amd64.deb? Just tested it out and it works for me.

Well if you have a Ethernet dongle I don't see anything that restricts you from using a pi zero 2w :)

Hi, maybe I can have a look into it the following week, I'll keep you updated. Seems like a nice idea for trying to debug physical systems!

Hey! Sadly I lost track of some of the issues... As I did/do all my development of the exploit on a virtual machine, I never had the need of this...