I created a video where I am performing a DMA attack with a PCMCIA to FireWire adapter on a Windows 7 machine, using Bitlocker full volume encryption with Trusted Platform Module only authentication. After the Windows authentication signature has been found and patched by the Inception software, it is possible to log in to Windows without entering the correct password. When logged in, the files have been decrypted and can be viewed.
Although in this video Windows 7 is used, this attack is still relevant for any operating system.
All computers with DMA ports are vulnerable: PCMCIA, ThunderBolt, FireWire, PCI, PCI-Express. For a secure computer add a second authentication method, such as, a Bitlocker pre boot PIN or USB key.
The video doesnt have any sound!
If it is possible to access the Windows login screen, then the computer is vulnerable for a physical cyber attack. Multiple ports use the principle of DMA, this makes the transfer of high speed data possible, but it also makes the computer vulnerable for attacks. When the computer is connected through the PCMCIA to FireWire adapter, malicious code can be run (Inception tool: https://github.com/carmaa/inception), this will patch the Windows authentication signature. If the signature has been found and patched, every password can be used to log in regardless of the correctness.
Later this week I will post a video where a DMA attack is performed while all the external ports are closed for interactions (PCMCIA port cant be used). In other words, the attack will be performed through an internal port.