Difference between revisions of "Defeating Whole Disk Encryption"

From ForensicsWiki
Jump to: navigation, search
m (New page: PGP Whole Disk Encryption has the ability to generate a "temporary key." Normally the use of the temporary key leaves a trace on the disk being cracked. But according to a recent cyberspea...)
 
 
(2 intermediate revisions by 2 users not shown)
Line 1: Line 1:
PGP Whole Disk Encryption has the ability to generate a "temporary key." Normally the use of the temporary key leaves a trace on the disk being cracked. But according to a recent cyberspeak podcast, when this feature is used on a hard drive that has a write-blocker attached, it still works.
+
PGP [[Whole Disk Encryption]] has the ability to generate a "temporary key". Normally the use of the temporary key leaves a trace on the disk being cracked. But according to a recent cyberspeak podcast, when this feature is used on a hard drive that has a write-blocker attached, it still works.
  
Bitlocker: you can unlock a drive with the cscript command, leave the master key in the clear. Use these commands:
+
[[BitLocker]]: You can unlock a drive with the cscript command, leaving the master key in the clear by using these commands:
 
   cscript manage-bdg.wsf unlock c:
 
   cscript manage-bdg.wsf unlock c:
 
   cscript manage-bdg.wsf autounlock enable c:
 
   cscript manage-bdg.wsf autounlock enable c:
 +
 +
[[Category:Disk encryption]]

Latest revision as of 18:31, 29 December 2008

PGP Whole Disk Encryption has the ability to generate a "temporary key". Normally the use of the temporary key leaves a trace on the disk being cracked. But according to a recent cyberspeak podcast, when this feature is used on a hard drive that has a write-blocker attached, it still works.

BitLocker: You can unlock a drive with the cscript command, leaving the master key in the clear by using these commands:

 cscript manage-bdg.wsf unlock c:
 cscript manage-bdg.wsf autounlock enable c: