Andreas Grasser
Andreas Grasser
Hi! As far as I understand, you were able to modify and extract the BCD file. One thing that helped me debugging the Boot process was to replace the boot...
I assume that booting fails for the same reason as in #13 that the computer does not trust third party CAs. It would probably still be possible to exploit the...
Oh wow, I did not notice that Martanne already implemented the WindowsPE method 😮
Hard to guess the issue here... Maybe the BitLocker partition was not decrypted by the bootmanager. Can you tell me something about the system configuration? Is this a virtual machine?
The needle "-FVE-FS-" does not really hint to BitLocker-Decryption being involved, I had a lot of unsuccessful Bitpixie attempts where the output looked similar to the one you provided. The...
The other exploits from the Wack0 repository would likely fit into a different project as they don't depend on PXE-boot :)
Do you mean the link https://snapshot.debian.org/archive/debian/20240716T023930Z/pool/main/g/grub-efi-amd64-signed/grub-efi-amd64-signed_1%2B2.12%2B5_amd64.deb? Just tested it out and it works for me.
Well if you have a Ethernet dongle I don't see anything that restricts you from using a pi zero 2w :)
Hi, maybe I can have a look into it the following week, I'll keep you updated. Seems like a nice idea for trying to debug physical systems!
Hey! Sadly I lost track of some of the issues... As I did/do all my development of the exploit on a virtual machine, I never had the need of this...