Abusing Windows Hello Without a Severed Hand

Ceri Coburn, Dirk jan Mollema

DEF CON 32 Main Stage · Day 1 · Main Stage

This talk, "Abusing Windows Hello Without a Severed Hand," presented by Ceri Coburn and Dirk Jan Mollema at DEF CON 32, delves into the intricate security mechanisms of Microsoft's **Windows Hello** technology and exposes critical vulnerabilities. The research primarily focuses on how an attacker, particularly one with elevated privileges, can bypass or exploit the system to gain unauthorized access or exfiltrate sensitive cryptographic material. Given Windows Hello's increasing adoption as a passwordless authentication solution for operating system logins, passkeys, and third-party applications, understanding these attack vectors is paramount for both enterprise and consumer security.

AI review

This research meticulously dissects the internal architecture of Windows Hello, moving beyond surface-level discussions to expose critical vulnerabilities stemming from its reliance on underlying Key Storage Providers. The detailed analysis of NGC service metadata and the discovery of intermediate PINs provides actionable intelligence for hardening enterprise environments. While the core concept of software vs. hardware-backed keys isn't entirely novel, the depth of the technical investigation and the specific mechanisms revealed make this a highly impactful and valuable contribution to…

Watch on YouTube