begood Posted July 5, 2010 Report Posted July 5, 2010 (edited) The latest version of Passware Kit Forensic has become the first commercially available software to break TrueCrypt hard drive encryption without applying a time-consuming brute-force attack. It was also the first product to decrypt BitLocker drives.Long believed unbreakable, TrueCrypt is a free open-source full-disk encryption software for Windows 7/Vista/XP, Mac OS X and Linux, that creates virtual hard disks with real-time encryption.Passware Kit Forensic allows for memory acquisition of a seized computer over the FireWire port, even if the computer is locked. When a target computer is seized and turned on with the encryption disk accessible, the software scans its memory image and extracts the encryption keys, so law enforcement personnel can access the stored data. Passware Kit Forensic 9.7 is a complete encrypted evidence discovery solution that reports all password-protected items on a computer and gains access to these items using the advanced decryption and password recovery algorithms. The software, which can also run in portable mode from a USB drive, is capable of finding encrypted data and recovering file and website passwords without making any changes to the target computer.It supports over 180 different file types and features recovery of passwords for PGP archives and virtual disks. The software supports Windows 7, Vista, 2003, XP, and 2008 Server, and now works with Guidance EnCase E01 disk image files -- the de-facto standard for computer forensics.The solution is now available with a suggested list price that starts at $795. The software comes with one year of free software updates. Free trial licenses are also available.Break TrueCrypt hard drive encryption quickly-----------NOTE: If a TrueCrypt volume is already dismounted, or the target computer is turned off, the memory image will not contain the encryption keys. Therefore, instant decryption of the volume is impossible. In this case Passware Kit assigns Brute-force attacks to recover the original password for the volume.//de asta daca auzi politia la usa, nu trebuie decat sa faci o combinatie de taste pentru inchide partitia (in truecrypt) Edited July 5, 2010 by begood 1 Quote
Flubber Posted July 5, 2010 Report Posted July 5, 2010 L-a testat cineva? O demonstratie? Stiu ca este scump, dar intreb si eu... Nu stiu de ce, dar nu prea imi vine sa cred... Quote
dragosh1904 Posted July 5, 2010 Report Posted July 5, 2010 @flubber cred ca aia de la fbi care se chinuiau de un an sa decrpiteze Quote
xact Posted July 5, 2010 Report Posted July 5, 2010 Sunt multe metode "outside the box", exemplu: Cryogenically frozen RAM bypasses all disk encryption methods | ZDNetImportant e shortcut-ul potrivit la momentul potrivit.LE: Quote
begood Posted July 5, 2010 Author Report Posted July 5, 2010 (edited) fratilore nefolositor din moment ce odata inchis containerul criptat, cheile din memorie sunt suprascrise.practic ei gasesc parola la un container deja deschis => destul de inutil, nu credeti ? datele oricum sunt compromise.@xact that's rubber hose cryptanalysis !basic stuff. shall i demonstrate on flubber here ? Edited July 5, 2010 by begood Quote
Krisler12™ Posted July 5, 2010 Report Posted July 5, 2010 fratilore nefolositor din moment ce odata inchis containerul criptat, cheile din memorie sunt suprascrise.practic ei gasesc parola la un container deja deschis => destul de inutil, nu credeti ? datele oricum sunt compromise.@xact that's rubber hose cryptanalysis !basic stuff. shall i demonstrate on flubber here ?"Nefolositor" ?????the first commercially available software to break TrueCrypt hard drive encryption without applying a time-consuming brute-force attackNu cumva o fi gasit vreo metoda de a ocoli cifrul ? sau poate or fi gasit vreo alta metoda ca doar nu vorbesc prostii, nu ? Quote
xact Posted July 6, 2010 Report Posted July 6, 2010 fratilor@xact that's rubber hose cryptanalysis !basic stuff. shall i demonstrate on flubber here ?Was just a joke! Quote