Suivre

In this article, we will explore how TPM2 based disk decryption works & understand why many setups are vulnerable to a kind of filesystem confusion attack. We will follow along by exploiting two (2) different real systems [ oddlama.org/blog/bypassing-dis ]

Inscrivez-vous pour prendre part à la conversation
nanao

Comme le soleil, les machines ne se couchent jamais.