What type of attacks can be carried against an OS with FDE, if we assume OS and FDE are implemented correctly?

The question is mainly stated in the title. I was wondering what kind of attacks can be launched on such a setup, where someone has access to a running OS with locked screen (needs password for the user to enter). One possibility I can thi… Continue reading What type of attacks can be carried against an OS with FDE, if we assume OS and FDE are implemented correctly?

How hard is it to modify UEFI nvram if the device is off and the UEFI is locked?

This assumes that:

Machine is powered off
No UEFI backdoors
No Reflashing the firmware
No clearing the NVRAM (The point is to modify/read a small amount of NVRAM, instead of resetting it)
Device requires password to POST (Enforced by BIOS… Continue reading How hard is it to modify UEFI nvram if the device is off and the UEFI is locked?

Does Windows 10 read/run/care about USB devices plugged in "Lock Screen" mode?

Whenever I leave my computer for the bathroom or anything inside the living space, I press WinKey + L to enter the "Lock Screen" mode. (If I go outside, I turn it off completely.)
Let’s say that somebody is in my house. I lock my… Continue reading Does Windows 10 read/run/care about USB devices plugged in "Lock Screen" mode?

What tools currently allow to retrieve Windows 10/11 password hashes, given admin rights or physical access to unencrypted disks?

I was wondering what Windows/Linux/Live tools allow to retrieve user password hashes of modern 2021 Win10/11 installations. I am not sure if password storage differs in these cases (e.g. different location or hash in use) from previous Win… Continue reading What tools currently allow to retrieve Windows 10/11 password hashes, given admin rights or physical access to unencrypted disks?

What are the best steps to take to secure a LINUX PC from physical attack? Evil Maid, Boot Sector Malware?

What would be the best security practice to protect a device from physical attack? For instance an Evil Maid or boot sector malware?
For this question we are going to go with a UEFI boot debian linux OS laptop. Obviously, encrypting the … Continue reading What are the best steps to take to secure a LINUX PC from physical attack? Evil Maid, Boot Sector Malware?

After EOL, can safety-critical systems be secured when connected to internet-connected components? [Automotive]

NOTE: This was originally asked on the main StackOverflow site, but now moved here because of the security nature of the question.
Since internet-connected Infotainment Systems are now connected with other components of a car… Is it pos… Continue reading After EOL, can safety-critical systems be secured when connected to internet-connected components? [Automotive]