As described in the TSforge blogpost, the AES key needed to decrypt the physical store's contents is encrypted using an RSA whitebox located in a component known as the blackbox/secure processor (spsys.sys
on Windows Vista/7, part of sppsvc.exe
on Windows 8+). Luckily, with a debugger and a basic understanding of the math behind RSA, the private key of this whitebox can be easily extracted, allowing exploits like ZeroCID to be carried out on an unmodified system.
In the symbols for spsys.sys
in Windows 8 build 7850, the whitebox is named SpModExpPrv
. This function only implements plain RSA decryption with a constant private key, and other code is used to implement operations such as padding and RSA encryption.