Windows Kerberos Security Feature Bypass
This exploit allows an attacker to gain access to a system with BitLocker enabled without PIN or USB key, and with Password Caching enabled, by obtaining physical access to the system and obtaining the FQDN of the device. The attacker then creates an Active Directory with a user with a similar name as the previously logged in user, and a Computer Object with the same name as the target system. The ServicePrincipleName of the Computer Object is then changed to the FQDN of the target system. The attacker then establishes a network connection between the target system and the newly created Domain Controller, and logs in with the password defined in the user created in the Active Directory. The target system displays a change password screen, and the attacker sets a new password and confirms. The attacker then disconnects the target system's network connection and logs in with the new changed password.