Bypassing Self-Encrypting Drives (SED) in Enterprise Environments
by Daniel Boteanu & Kevvie Fowler
For years, Full-Disk Encryption (FDE) solutions have been advertised as the "silver bullet" solution to protect against the unauthorized disclosure of sensitive data at rest. Hardware-based FDE, known as Self-Encrypting Drives (SED), have reportedly zero overhead and enhanced security in contrast to software encryption alternatives and have already been adopted by organizations across the world.
Unknowingly, organizations using SED have been sitting on a critical exposure to their data that they thought was encrypted.
This session will explore SED solutions, a newly discovered vulnerability that allows you to circumvent their protection mechanisms and how organizations can protect themselves against this new threat.
Видео Bypassing Self-Encrypting Drives (SED) in Enterprise Environments канала Black Hat
For years, Full-Disk Encryption (FDE) solutions have been advertised as the "silver bullet" solution to protect against the unauthorized disclosure of sensitive data at rest. Hardware-based FDE, known as Self-Encrypting Drives (SED), have reportedly zero overhead and enhanced security in contrast to software encryption alternatives and have already been adopted by organizations across the world.
Unknowingly, organizations using SED have been sitting on a critical exposure to their data that they thought was encrypted.
This session will explore SED solutions, a newly discovered vulnerability that allows you to circumvent their protection mechanisms and how organizations can protect themselves against this new threat.
Видео Bypassing Self-Encrypting Drives (SED) in Enterprise Environments канала Black Hat
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![](https://i.ytimg.com/vi/WdCbaWzE7fA/default.jpg)
![SOLID STATE DRIVES | How It's Made](https://i.ytimg.com/vi/fCpn8umYnyg/default.jpg)
![Should You Get Self-Encrypting Drives? (Hardware Encryption)](https://i.ytimg.com/vi/5AaRYO2l6rk/default.jpg)
![You Need To Encrypt Your Drives! (Seriously...)](https://i.ytimg.com/vi/0NfvKci3WF0/default.jpg)
![Data Security Using TCG Self-Encrypting Drive Technology](https://i.ytimg.com/vi/BInrtq0CXQk/default.jpg)
![PC BIOS Settings](https://i.ytimg.com/vi/ezubjTO7rRI/default.jpg)
![Using sedutil to Revert the PSID of a Crucial or Samsung SSD within Windows](https://i.ytimg.com/vi/UsunkWpwGZI/default.jpg)
![Completely format hard drive removing all partitions (including OEM)](https://i.ytimg.com/vi/6lTrZopRtE8/default.jpg)
![15 Command Prompt Secrets and Tricks in Windows](https://i.ytimg.com/vi/7yW6Ybj6tOk/default.jpg)
![Aegis Secure Key 3.0 Tutorial 1: GETTING STARTED](https://i.ytimg.com/vi/RfDLDsd_9wU/default.jpg)
![ENCRYPTED SSD UNLOCKING | WIN MAGIC SOFTWARE | TECH HUNTS](https://i.ytimg.com/vi/W_0E_uZKm8I/default.jpg)
![35C3 - Self-encrypting deception](https://i.ytimg.com/vi/C5hLTk5MyGU/default.jpg)
![Encrypted USB Flash Drives Explained - DIY in 5 Ep 92](https://i.ytimg.com/vi/xf_hRTzSnvU/default.jpg)
![Self-Encrypting Deception: Weaknesses in the Encryption of Solid State Drives](https://i.ytimg.com/vi/uE_Q2em9cFM/default.jpg)
![How to boot ASUS Laptop from Bootable USB Drive - BIOS Utility EZ mode | VivoBook F570ZD](https://i.ytimg.com/vi/ECmYtPBSMI8/default.jpg)
![End to End Encryption (E2EE) - Computerphile](https://i.ytimg.com/vi/jkV1KEJGKRA/default.jpg)
![All SSD Types EXPLAINED](https://i.ytimg.com/vi/kx0ynC8Thlw/default.jpg)
![Using sedutil to Revert the PSID of a Crucial or Samsung SSD](https://i.ytimg.com/vi/cK3FKiz-w8o/default.jpg)
![[FIX] Access Denied When Opening Bitlocker Encrypted Drive](https://i.ytimg.com/vi/dOnv3nE4D2Y/default.jpg)
![How to reset ASMI passwords on a IBM POWER server](https://i.ytimg.com/vi/BtbCJSmf48c/default.jpg)