Difference between pages "BitLocker Disk Encryption" and "JTAG Samsung Galaxy Centura (SCH-S738C)"

From ForensicsWiki
(Difference between pages)
Jump to: navigation, search
(How to detect)
 
m (Samsung Galaxy Centura SCH-S738C)
 
Line 1: Line 1:
'''BitLocker Disk Encryption''' (BDE) is [[Full Volume Encryption]] solution by [[Microsoft]] first included with the Enterprise and Ultimate editions of [[Windows|Windows Vista]]. It is also present in [[Windows|Windows 7]] along with a system for encrypting removable storage media devices, like [[USB]], which is called BitLocker To Go. Unlike previous versions of BitLocker, BitLocker To Go allows the user to protect volumes with a password or smart card.
+
== Samsung Galaxy Centura SCH-S738C ==
  
== BitLocker ==
+
This phone is supported by the Tracfone network and uses a Qualcomm MSM7625A 800 MHz Snapdragon (S1) Processor. The phone has 4 GB of internal storage with a Samsung KMSJS000KM B308 MoviNAND flash memory chip. This phone is unsupported by RIFF Box for the JTAG process but can be imaged with the direct access plugin.  
BitLocker encrypts data with either 128-bit or 256-bit [[AES]] and optionally using a diffuser algorithm called Elephant. The key used to do the encryption, the Full Volume Encryption Key (FVEK) and/or TWEAK key, is stored in the BitLocker metadata on the protected volume. The FVEK and/or TWEAK keys are encrypted using another key, namely the Volume Master Key (VMK). Several copies of the VMK are also stored in the metadata. Each copy of the VMK is encrypted using another key, also know as key-protector key. Some of the key-protectors are:
+
* TPM (Trusted Platform Module)
+
* Smart card
+
* recovery password
+
* start-up key
+
* clear key; this key-protector provides no protection
+
* user password
+
  
BitLocker has support for partial encrypted volumes.
+
{| border="1" cellpadding="2"
 +
|-
 +
| [[ File:S738C_front.JPG | 200px ]]
 +
|-
 +
|}
  
=== BitLocker To Go ===
+
=== Getting Started ===
Volumes encrypted with BitLocker To Go will have a hybrid encrypted volume, meaning that part of the volume is unencrypted and contains applications to unlock the volume and the other part of the volume is encrypted. The "discovery drive" volume contains BitLocker To Go Reader to read from encrypted volumes on versions of Microsoft [[Windows]] without BitLocker support.
+
  
== How to detect ==
 
Volumes encrypted with BitLocker will have a different signature than the standard [[NTFS]] header.
 
  
A BitLocker encrypted volume starts with the "-FVE-FS-" signature.
+
What you need:
  
A hexdump of the start of the volume should look similar to:
 
<pre>
 
00000000  eb 58 90 2d 46 56 45 2d  46 53 2d 00 02 08 00 00  |.X.-FVE-FS-.....|
 
00000010  00 00 00 00 00 f8 00 00  3f 00 ff 00 00 00 00 00  |........?.......|
 
00000020  00 00 00 00 e0 1f 00 00  00 00 00 00 00 00 00 00  |................|
 
00000030  01 00 06 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
 
00000040  80 00 29 00 00 00 00 4e  4f 20 4e 41 4d 45 20 20  |..)....NO NAME  |
 
00000050  20 20 46 41 54 33 32 20  20 20 33 c9 8e d1 bc f4  |  FAT32  3.....|
 
</pre>
 
  
These volumes can also be identified by a GUID:
+
# Riff Box
* for BitLocker: 4967d63b-2e29-4ad8-8399-f6a339e3d00
+
# USB to Micro USB cord
* for BitLocker ToGo 4967d63b-2e29-4ad8-8399-f6a339e3d01.
+
  
Which in a hexdump of the start of the volume should look similar to:
 
<pre>
 
000000a0  3b d6 67 49 29 2e d8 4a  83 99 f6 a3 39 e3 d0 01  |;.gI)..J....9...|
 
</pre>
 
  
== manage-bde ==
+
=== NAND Dump Procedure ===
To view the BitLocker Drive Encryption (BDE) status on a running Windows system:
+
<pre>
+
manage-bde.exe -status
+
</pre>
+
  
To obtain the recovery password for volume C:
 
<pre>
 
manage-bde.exe -protectors -get C: -Type recoverypassword
 
</pre>
 
  
Or just obtain the all “protectors” for volume C:
+
# Remove the rear cover, exposing the 7 phillips head screws.
<pre>
+
# Remove the screws and the rear plastic casing with a plastic pry tool.
manage-bde.exe -protectors -get C:
+
# Remove the two molex connectors attached on the right and top of the printed circuit board.
</pre>
+
# Remove the printed circuit board from the screen casing exposing the nine TAPS on the reverse side. Note the small copper carrot indicating the direction of the TAPS.
 +
# Connect the RIFF box to the JTAG pins.
 +
# Connect the PCB to a Micro USB cord and power via a power supply.
 +
# Start the "RIFF box" software.
 +
# Power the PCB.
 +
# Dump the NAND.
  
== See Also ==
+
{| border="1" cellpadding="2"
* [[BitLocker:_how_to_image|BitLocker: How to image]]
+
|-
* [[Defeating Whole Disk Encryption]]
+
| [[ File:S738C_back.JPG | 600px ]]
 +
|-
 +
|}
  
== External Links ==
+
{| border="1" cellpadding="2"
 +
|-
 +
| [[ File:S738C_case.JPG | 600px ]]
 +
|-
 +
|}
  
* [http://en.wikipedia.org/wiki/BitLocker_Drive_Encryption Wikipedia entry on BitLocker]
+
{| border="1" cellpadding="2"
* [http://www.nvlabs.in/nvbit_bitlocker_white_paper.pdf Accessing Bitlocker volumes from linux], by Nitin Kumar and Vipin Kumar, 2008
+
|-
* [http://jessekornblum.com/publications/di09.html Implementing BitLocker for Forensic Analysis], ''Digital Investigation'', by Jesse D. Kornblum, 2009
+
| [[ File:S738C_molex.JPG | 600px ]]
* [https://googledrive.com/host/0B3fBvzttpiiSX2VCRk16TnpDd0U/BitLocker%20Drive%20Encryption%20(BDE)%20format.pdf BitLocker Drive Encryption (BDE) format specification], by the [[libbde|libbde project]], March 2011
+
|-
* [http://technet2.microsoft.com/WindowsVista/en/library/c61f2a12-8ae6-4957-b031-97b4d762cf311033.mspx?mfr=true Microsoft's Step by Step Guide]
+
|}
* [http://technet.microsoft.com/en-us/windowsvista/aa906017.aspx Microsoft Technical Overview]
+
The TAPS order is as follows:
* [http://technet.microsoft.com/en-us/magazine/2009.05.win7.aspx An Introduction to Security in Windows 7]
+
* [http://www.microsoft.com/whdc/system/platform/hwsecurity/BitLockerFAQ.mspx Microsoft FAQ]
+
* [http://www.microsoft.com/downloads/details.aspx?FamilyID=131dae03-39ae-48be-a8d6-8b0034c92555&DisplayLang=en Microsoft Description of the Encryption Algorithm]
+
* [http://secude.com/htm/801/en/White_Paper%3A_Cold_Boot_Attacks.htm Cold Boot Attacks, Full Disk Encryption, and BitLocker]
+
* [http://technet.microsoft.com/en-us/library/hh831412.aspx What's New in BitLocker] in Windows 8
+
  
== Tools ==
+
# 1=GND
* [http://www.hsc.fr/ressources/outils/dislocker/ dislocker]
+
# 2=NRST
* [[libbde]]
+
# 3=TDO
 +
# 4=TCK
 +
# 5=TDI
 +
# 6=TRST
 +
# 7=RTCK
 +
# 8=TMS
 +
# 9=N/A
  
[[Category:Disk encryption]]
+
 
[[Category:Windows]]
+
{| border="1" cellpadding="2"
 +
|-
 +
| [[ File:S738C_TAPS.JPG | 600px ]]
 +
|-
 +
|}
 +
 
 +
***Test has shown for the best results and fewer read errors, use short wires directly to the RIFF box ribbon interface.***
 +
 
 +
After the wires are connected to the board, the phone is powered by the USB connection. Plug the Micro USB into the USB connection on the device and then plug the phone into the USB port on the laptop.
 +
 
 +
 
 +
Launch the Riff Box JTAG Manager and use the following settings:
 +
 
 +
 
 +
* Navigate to the Useful Plugins tab
 +
* Select the Direct JTAG Access to Flash Memory Plugin. Note the directions displayed in the window along with supported processors.
 +
* Activate the plugin
 +
* Choose the MSM7627A from the drop down menu on the right side ** Note this is not the processor but it will allow access the the memory.
 +
* Select eMMC SDC3 (via chipset) from the Memory Type & Host drop down.
 +
* Check Auto FullFlash size
 +
* Select Connect & Flash ID. ** This will not flash the memory chip initially, but will only connect**
 +
* Choose the read button from the bottom left corner. This will connect to the device and display the partitions and chip ID.
 +
 
 +
{| border="1" cellpadding="2"
 +
|-
 +
| [[ File:active_plugin.JPG | 800px ]]
 +
|-
 +
|}
 +
 
 +
{| border="1" cellpadding="2"
 +
|-
 +
| [[ File:SCH-S738C_Setting2.JPG | 800px ]]
 +
|-
 +
|}
 +
 
 +
{| border="1" cellpadding="2"
 +
|-
 +
| [[ File:SCH_S738C_Setting2.PNG | 800px ]]
 +
|-
 +
|}
 +
 
 +
 
 +
 
 +
=== Notes ===
 +
 
 +
 
 +
The phone has a 4GB MoviNAND flash memory chip which should take approximately 24 hours to download. This takes much longer the normal because the direct access plugin functions at a much slower speed then normal JTAG methods. Test have found using shorter large wires and no intermediate PCB board increases performance.
 +
 
 +
 
 +
=== References ===
 +
*http://www.riffbox.org/

Revision as of 21:29, 23 December 2013

Samsung Galaxy Centura SCH-S738C

This phone is supported by the Tracfone network and uses a Qualcomm MSM7625A 800 MHz Snapdragon (S1) Processor. The phone has 4 GB of internal storage with a Samsung KMSJS000KM B308 MoviNAND flash memory chip. This phone is unsupported by RIFF Box for the JTAG process but can be imaged with the direct access plugin.

S738C front.JPG

Getting Started

What you need:


  1. Riff Box
  2. USB to Micro USB cord


NAND Dump Procedure

  1. Remove the rear cover, exposing the 7 phillips head screws.
  2. Remove the screws and the rear plastic casing with a plastic pry tool.
  3. Remove the two molex connectors attached on the right and top of the printed circuit board.
  4. Remove the printed circuit board from the screen casing exposing the nine TAPS on the reverse side. Note the small copper carrot indicating the direction of the TAPS.
  5. Connect the RIFF box to the JTAG pins.
  6. Connect the PCB to a Micro USB cord and power via a power supply.
  7. Start the "RIFF box" software.
  8. Power the PCB.
  9. Dump the NAND.
S738C back.JPG
S738C case.JPG
S738C molex.JPG

The TAPS order is as follows:

  1. 1=GND
  2. 2=NRST
  3. 3=TDO
  4. 4=TCK
  5. 5=TDI
  6. 6=TRST
  7. 7=RTCK
  8. 8=TMS
  9. 9=N/A


S738C TAPS.JPG
      • Test has shown for the best results and fewer read errors, use short wires directly to the RIFF box ribbon interface.***

After the wires are connected to the board, the phone is powered by the USB connection. Plug the Micro USB into the USB connection on the device and then plug the phone into the USB port on the laptop.


Launch the Riff Box JTAG Manager and use the following settings:


  • Navigate to the Useful Plugins tab
  • Select the Direct JTAG Access to Flash Memory Plugin. Note the directions displayed in the window along with supported processors.
  • Activate the plugin
  • Choose the MSM7627A from the drop down menu on the right side ** Note this is not the processor but it will allow access the the memory.
  • Select eMMC SDC3 (via chipset) from the Memory Type & Host drop down.
  • Check Auto FullFlash size
  • Select Connect & Flash ID. ** This will not flash the memory chip initially, but will only connect**
  • Choose the read button from the bottom left corner. This will connect to the device and display the partitions and chip ID.
Active plugin.JPG
SCH-S738C Setting2.JPG
SCH S738C Setting2.PNG


Notes

The phone has a 4GB MoviNAND flash memory chip which should take approximately 24 hours to download. This takes much longer the normal because the direct access plugin functions at a much slower speed then normal JTAG methods. Test have found using shorter large wires and no intermediate PCB board increases performance.


References