AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |
Back to Blog
Truecrypt or bitlocker3/8/2023 In previous versions, the toolkit was limited to mounting or decrypting volumes with binary cryptographic keys extracted from the computer’s memory image or hibernation file. These volumes along with their corresponding encryption settings are then displayed in the main window. Once you open the disk (or disk image), EFDD scans the disk (or image) and identifies all encrypted volumes available on that disk. You begin with launching Elcomsoft Forensic Disk Decryptor 2.0 and opening a physical disk or disk image (did I mention we now support EnCase. But that’s not everything! We completely revamped the way you use the tool by automatically identifying all available encrypted volumes, and providing detailed information about the encryption method used for each volume. E01 and encrypted DMG images are now available. Plain text passwords and recovery keys, a Microsoft-signed kernel-level RAM imaging tool, the highly anticipated portable version and support for the industry-standard EnCase. With today’s release, Elcomsoft Forensic Disk Decryptor gets back on its feets, including everything that was missing in earlier versions. It didn’t come with a memory imaging tool of its own, making its users rely on third-party solutions. It couldn’t use plain text passwords to mount or decrypt encrypted volumes, and it didn’t support escrow (recovery) keys. What Elcomsoft Forensic Disk Decryptor did not do until now was pretty much everything else. We could find and extract that key by analyzing the memory dump or hibernation files. With this tool, one could extract data from an encrypted disk volume (FileVault 2, PGP, BitLocker or TrueCrypt) by utilizing the binary encryption key contained in the computer’s RAM. In addition to patches for these two flaws, the program also has other security improvements over its predecessor.It’s been a long while since we made an update to one of our most technically advanced tools, Elcomsoft Forensic Disk Decryptor (EFDD). Users who still use TrueCrypt should switch to VeraCrypt as soon as possible. Microsoft's BitLocker is not available on Home editions of Windows, which come pre-installed on many consumer laptops, and most other programs that can encrypt the system partition require a paid license. There are still many users of TrueCrypt or VeraCrypt, because it's one of the few free options they have for encrypting their entire hard disks, including the Windows system partition. The program's developer only flagged the CVE-2015-7358 flaw as critical and said that it can be exploited by "abusing drive letter handling." VeraCrypt 1.15 that was released Saturday, contains patches for the two vulnerabilities, identified as CVE-2015-7358 and CVE-2015-7359, as well as for other bugs. However, they have been fixed in VeraCrypt, an open-source program based on the TrueCrypt code that aims to continue and improve the original project. Since TrueCrypt is no longer actively maintained, the bugs won't be fixed directly in the program's code. The Google researcher hasn't disclosed details about the two bugs yet, saying that he usually waits seven days after a patch is released to open his bug reports. The first phase of the TrueCrypt audit project, performed by security engineers from iSEC Partners, a subsidiary of information assurance company NCC Group, covered the driver code, but "Windows drivers are complex beasts" and it's easy to miss local elevation of privilege flaws, Forshaw said on Twitter. It's impossible to tell if the new flaws discovered by Forshaw were introduced intentionally or not, but they do show that despite professional code audits, serious bugs can remain undiscovered. The auditors found no high-severity issues or evidence of intentional backdoors in the program. The first phase, which analyzed the TrueCrypt driver and other critical parts of the code, had already been completed when TrueCrypt was discontinued. The original authors of TrueCrypt, who have remained anonymous, abruptly shut down the project in May 2014 warning that "it may contain unfixed security issues" and advised users to switch to BitLocker, Microsoft's full-disk encryption feature that's available in certain versions of Windows.Īt that time a crowd-funded effort was already underway to perform a professional security audit of TrueCrypt's source code and its cryptography implementations. The flaws, which were apparently missed in an earlier independent audit of the TrueCrypt source code, could allow attackers to obtain elevated privileges on a system if they have access to a limited user account.
0 Comments
Read More
Leave a Reply. |