BitLocker Exploitation | Lateral Movement Techniques | Windows Security Vulnerabilities Cybercriminals Can Exploit BitLocker Registry Keys Through WMI to Run Malicious Code as an Interactive User