It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
PhoenixOD
CallYourBluff
The truth of the matter is, you don't need to brute force any password. The information can be taken physically from a hard drive. There are many ways to bypass the entire encryption process. It's not as if a hard drive has a dynamic encryption.
You can not lift data physically from a bitlocker encrypted drive , thats the whole point of the system
BitLocker ensures that every sector is encrypted with a slightly different key
Which could be called dynamically encrypted.
books.google.co.uk... NzJDCDnQ8&hl=en&sa=X&ei=uta0UvTkMsWw7AbejYGQDA&ved=0CEAQ6AEwAg#v=onepage&q=bit%20locker%20encrypts%20every%20sector&f=false
edit on 20-12-2013 by PhoenixOD because: (no reason given)
If the PC being investigated is turned off, the encryption keys can be retrieved from the hibernation file. The encrypted volume must be mounted before the computer went to sleep. If the volume is dismounted before hibernation, the encryption keys may not be derived from the hibernation file.
If the PC is turned on, a memory dump can be taken with any forensic tool if installation of such tool is permitted (e.g. the PC is unlocked and logged-in account has administrative privileges). The encrypted volume must be mounted at the time of memory dump acquisition. Good description of this technology (and complete list of free and commercial memory acquisition tools) is available at www.forensicswiki.org...:Memory_Imaging.
Finally, if the PC being investigated is turned on but installing forensic tools is not possible (e.g. the PC is locked or logged-in account lacks administrative privileges), a remote attack via a FireWire port can be performed in order to obtain a memory dump. This attack requires the use of a free third-party tool (such as Inception: www.breaknenter.org...), and offers near 100% results due to the implementation of FireWire protocol that enables direct memory access. Both the target PC and the computer used for acquisition must have FireWire (IEEE 1394) ports.
Well clearly Watkins was not using this level of encryption.
PhoenixOD
reply to post by CallYourBluff
Well clearly Watkins was not using this level of encryption.
Its not clear at all, that the whole point of the thread, at this point in time we dont know what kind of encryption he used other than it was hard drive encryption and file encryption. We want to know what kind of hard drive encryption it was but truecrypt and bitlocker are the most common. We also dont know what method was used to crack the passwords for both.
I could guess that the hibernation file method might be the way to go if it was a laptop as many windows laptops have hibernation set to enabled as default. But if this was the case then it wouldn't have taken an expert from GCQH to do the job as anyone with a small amount of computer knowledge could have done it.
C21H30O2I
He has started his sentence and time is being served at Her Majesty's Prison Wakefield . Also, called "monster mansion" because of the high profile / risk sexual criminals it houses. So, unfortunately , he will be amongst his own kind.