Blog | G5 Cyber Security

Notebook Security: Bypassing Lock Screen

TL;DR

Full disc encryption protects your data if a thief steals your notebook, but it doesn’t stop someone with physical access from unlocking it while the screen is locked. This guide covers common methods attackers use and how to defend against them.

Understanding the Risks

When your notebook is locked, the operating system (Windows, macOS, Linux) typically requires a password or PIN to decrypt the disc and allow access. However, several vulnerabilities can be exploited:

Step-by-Step Defence Guide

  1. Enable Strong Authentication:
    • Use a Complex Password: At least 12 characters with mixed case, numbers and symbols.
    • Consider Multi-Factor Authentication (MFA): If your OS supports it, enable MFA for an extra layer of security. This often involves a code sent to your phone or generated by an authenticator app.
    • Avoid Easy PINs: Don’t use easily guessable numbers like 1234 or your birthday.
  2. Disable Automatic Login:

    Prevent the notebook from automatically logging in after a restart. This forces password entry every time.

    • Windows: Go to Settings > Accounts > Sign-in options and disable automatic sign-in.
    • macOS: System Preferences > Users & Groups > Login Options, uncheck ‘Automatic login’.
  3. Keep Your Software Updated:

    Regularly update your operating system and all software. Updates often include security patches that address vulnerabilities.

    • Windows: Settings > Update & Security > Windows Update.
    • macOS: System Preferences > Software Update.
    • Linux (Debian/Ubuntu): sudo apt update && sudo apt upgrade
  4. Be Wary of USB Devices:

    Avoid plugging in unknown USB devices. They could contain keyloggers or malware.

  5. Enable BitLocker/FileVault/LUKS:

    Ensure full disc encryption is enabled and properly configured.

    • Windows (BitLocker): Control Panel > System and Security > BitLocker Drive Encryption.
    • macOS (FileVault): System Preferences > Security & Privacy > FileVault.
    • Linux (LUKS): Use a disk encryption tool during installation or cryptsetup from the command line.
  6. Secure Boot:

    Enable Secure Boot in your BIOS/UEFI settings to prevent bootkits from loading.

  7. Thunderbolt Security (Important):

    DMA attacks via Thunderbolt are a serious threat. Consider these options:

    • Disable Thunderbolt if not used: In BIOS/UEFI settings, disable the Thunderbolt port entirely.
    • Enable Kernel DMA Protection: Some operating systems offer kernel-level protection against DMA attacks. Check your OS documentation.
    • Use a Thunderbolt Dock with Security Features: Some docks have built-in security features to mitigate DMA risks.
  8. Monitor for Tampering:

    Physically inspect the notebook for any signs of tampering, such as unusual stickers or modifications.

Advanced Considerations

Exit mobile version