References
- Microsoft. 2024 [cited 2024 Jan 30]. Available from: https://learn.microsoft.com/en-us/lifecycle/products/windows-10-home-and-pro
- Microsoft. 2024a [cited 2024 Jan 30]. Available from: https://www.microsoft.com/en-us/research/project/the-trusted-platform-module-tpm/
- D’Aguanno J, Teräs T. 2023 [cited 2024 Jan 30]. Available from: https://blackwinghq.com/blog/posts/a-touch-of-pwn-part-i/
- Andzakovic D. 2019 [cited 2024 Jan 30]. Available from: https://pulsesecurity.co.nz/articles/TPM-sniffing
- Bichara de Assumpçao M, Reis M, Marcondes M, Eleutério PMDS, Vieira VH. Forensic method for decrypting TPM-protected BitLocker volumes using Intel DCI. Forensic Sci Int. 2023;44:301514. doi:10.1016/j.fsidi.2023.301514
- Microsoft. 2024b [cited 2024 Jan 30]. Available from: https://learn.microsoft.com/en-us/windows/security/operating-system-security/data-protection/bitlocker/countermeasures
- Microsoft. 2024c [cited 2024 Jan 30]. Available from: https://learn.microsoft.com/en-us/windows/security/hardware-security/tpm/tpm-fundamentals#anti-hammering
- Red Team Notes. 2024 [cited 2024 Jan 30]. Available from: https://www.ired.team/offensive-security/credential-access-and-credential-dumping/reading-dpapi-encrypted-secrets-with-mimikatz-and-c++#using-dpapis-to-encrypt-decrypt-data-in-c