Sign in to follow this  
Followers 0
achical

encryption

2 posts in this topic

Hi guys!!

im doing a working in the it-forensic area and i would like any help with this question.

'

suppose u have a hardisk where one of the partition is encrypted with Truecrypt 5.1a and is hidden as well

u know the key as 16 characteres AES 256 bit.

how would u find this hidden partition and how would collect data from it?

which tools you think can work better in this case

remember the laptop is runnig Win7 home premium

any ideas here guys

thanks for your time

0

Share this post


Link to post
Share on other sites

Hi guys!!

im doing a working in the it-forensic area and i would like any help with this question.

'

suppose u have a hardisk where one of the partition is encrypted with Truecrypt 5.1a and is hidden as well

u know the key as 16 characteres AES 256 bit.

how would u find this hidden partition and how would collect data from it?

which tools you think can work better in this case

remember the laptop is runnig Win7 home premium

any ideas here guys

thanks for your time

I don't get it. :ph34r:

Are you sure you do work in digital forensics? :unsure:

You are not serious about doing the work from the booted laptop, don't you? :w00t:

You IMAGE (forensic sound image) the disk first thing, then working on the IMAGE or on a CLONE of it:

  1. You find hidden partition in the MBR and/or EPBR's, then you unhide it, and if you have the key you unencrypt it.
  2. If you have not the key, then you need to "crack" it.

You will need some dedicated GPU(s) and a lot of patience (and a bit of luck).

jaclaz

0

Share this post


Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!


Register a new account

Sign in

Already have an account? Sign in here.


Sign In Now
Sign in to follow this  
Followers 0

  • Recently Browsing   0 members

    No registered users viewing this page.