Abusing Windows Hello Without A Severed Hand - v3
Abusing Windows Hello Without A Severed Hand - v3
Windows Hello
Without a
Severed Hand
DEF CON 32
whoami
Ceri Coburn (@_EthicalChaos_)
• Lives in Wales, UK
• Software developer for 18 years within the DRM and security solutions
space
• Joined Pen Test Partners in August 2019
• Dedicated to Red Teaming and offensive security tooling for the last 3
years
• Speaker at DEF CON 31 and BSides
• Author and maintainer of several open-source tools
• Rubeus
• BOF.NET
• Okta Terrify
• ThreadlessInject
• SharpBlock
• SweetPotato
• BeaconEye
Tenant
Timestamp
Generating the assertion ourselves
• Windows Hello can be used from user session
• We can use the Microsoft Passport Key Storage Provider from
software
• PIN is cached so not needed to prompt user or brute force it
• Need to use native NCrypt methods since C# methods for RSA keys
are limited to software keys
• No admin rights needed whatsoever
Generating assertion from user session
Signed assertion with WHFB private key (old)
WHFB attack: golden assertion
• Assertion can be generated from user session without admin rights
• Timestamp range can be anything, 10 years validity without problem
• Assertion can be used in the future to authenticate with WHFB key
Tenant
Timestamp
Nonce
WHFB attack: golden assertion
• Patched as CVE-2023-36871 and CVE-2023-35348 (AD FS) in July 2023
• Windows will now include a nonce in the assertion, which limits
assertion validity to 5 minutes
• Attack mechanics explained in FAQ, actual server side enforcement
for nonce only enabled in May 2024
WHFB assertion attack – remaining scenarios
• Assertion time window is now limited to 5 minutes (nonce validity).
• Does not stop us from requesting a PRT on a different device without
TPM (part of the design).
• Meaning we can still use the assertion from a victim to request a PRT
on a different device, bypassing TPM protection.
• PRT will have it’s regular 90 days validity and can be used to sign in to
anything Entra connected.
• Not mitigated by VBS, LSA PPL, Windows Hello ESS, TPM, etc
WHFB assertion stealing – From victim session
WHFB assertion stealing – attacker host
WHFB assertion stealing – token claims
Entra Mitigations
• Require device compliance
• Restrict device join / registration for regular users
• Monitor for new devices + use of existing WHFB key
• Don’t RDP to untrusted hosts with sensitive accounts
• https://dirkjanm.io/assets/raw/Windows%20Hello%20from%2
0the%20other%20side_nsec_v1.0.pdf
• https://dirkjanm.io/digging-further-into-the-primary-refresh-
token/
• https://www.insecurity.be/blog/2020/12/24/dpapi-in-depth-
with-tooling-standalone-dpapi/
• https://hashcat.net/forum/thread-10461.html
• https://aadinternals.com/
• https://hit.skku.edu/?page_id=2233