Difference between revisions of "Defeating Whole Disk Encryption"

From ForensicsWiki
Jump to: navigation, search
m (New page: PGP Whole Disk Encryption has the ability to generate a "temporary key." Normally the use of the temporary key leaves a trace on the disk being cracked. But according to a recent cyberspea...)
 
m (Textual Content Cleanup)
Line 1: Line 1:
 
PGP Whole Disk Encryption has the ability to generate a "temporary key." Normally the use of the temporary key leaves a trace on the disk being cracked. But according to a recent cyberspeak podcast, when this feature is used on a hard drive that has a write-blocker attached, it still works.
 
PGP Whole Disk Encryption has the ability to generate a "temporary key." Normally the use of the temporary key leaves a trace on the disk being cracked. But according to a recent cyberspeak podcast, when this feature is used on a hard drive that has a write-blocker attached, it still works.
  
Bitlocker: you can unlock a drive with the cscript command, leave the master key in the clear. Use these commands:
+
Bitlocker: You can unlock a drive with the cscript command, leaving the master key in the clear by using these commands:
 
   cscript manage-bdg.wsf unlock c:
 
   cscript manage-bdg.wsf unlock c:
 
   cscript manage-bdg.wsf autounlock enable c:
 
   cscript manage-bdg.wsf autounlock enable c:

Revision as of 12:15, 15 January 2008

PGP Whole Disk Encryption has the ability to generate a "temporary key." Normally the use of the temporary key leaves a trace on the disk being cracked. But according to a recent cyberspeak podcast, when this feature is used on a hard drive that has a write-blocker attached, it still works.

Bitlocker: You can unlock a drive with the cscript command, leaving the master key in the clear by using these commands:

 cscript manage-bdg.wsf unlock c:
 cscript manage-bdg.wsf autounlock enable c: