Handling Encrypted Evidence & Password Recovery: Nataly Koukoushkina June 2010 CCFC 2010, Workshop
Handling Encrypted Evidence & Password Recovery: Nataly Koukoushkina June 2010 CCFC 2010, Workshop
Handling Encrypted Evidence & Password Recovery: Nataly Koukoushkina June 2010 CCFC 2010, Workshop
Password Recovery
Nataly Koukoushkina
June 2010
CCFC 2010, Workshop
Passware
◦ In business for 12 years
◦ Offices in USA and Russia
◦ Products included in Certified Computer Examiner (CCE)
training
www.lostpassword.com
Part I. Encrypted Evidence Discovery &
Decryption.
◦ Overview of encryption types
◦ Discovering encrypted evidence
◦ Recovering easy and strong passwords
◦ Hardware acceleration methods
www.lostpassword.com
Part I. Encrypted Evidence Discovery &
Decryption.
◦ Overview of encryption types
◦ Discovering encrypted evidence
◦ Recovering easy and strong passwords
◦ Hardware acceleration methods
www.lostpassword.com
Stored passwords
◦ Internet browsers, etc.
Files
◦ Passwords
Disks
◦ Full Disk Encryption
Software
BitLocker
PGP
TrueCrypt
Hardware
www.lostpassword.com
No more „homegrown‟ encryption
Standard and widely accepted encryption
algorithms are used
Password is hashed, i.e. with SHA1 and then
the key is used of encryption (AES)
“Key strengthening” – SHA1 is used 10,000
times.
Office 2010, WinZip, RAR – use SHA1/AES
This is secure!
www.lostpassword.com
Part I. Encrypted Evidence Discovery &
Decryption.
◦ Overview of encryption types
◦ Discovering encrypted evidence
◦ Recovering easy and strong passwords
◦ Hardware acceleration methods
www.lostpassword.com
Passware Encryption Analyzer
www.lostpassword.com
Scans computers and network for password
protected files
Detects over 160 different file types
Scan speed over 4,000 files per minute
Detailed reports, lists encryption types and
how difficult it might be to decrypt the file
www.lostpassword.com
Part I. Encrypted Evidence Discovery &
Decryption.
◦ Overview of encryption types
◦ Discovering encrypted evidence
◦ Recovering easy and strong passwords
◦ Hardware acceleration methods
www.lostpassword.com
Password (or encryption key) attacks
Surprise seizure of the running computer
www.lostpassword.com
For password attacks with encryption getting
more secure it is important to find the weakest
link.
Same (or similar) passwords are used
Find the least secure encryption type first
www.lostpassword.com
Finding the weakest link:
Start with file types that are easy to decrypt
Build a good dictionary
Use wizard if password pattern is known
www.lostpassword.com
Part I. Encrypted Evidence Discovery &
Decryption.
◦ Overview of encryption types
◦ Discovering encrypted evidence
◦ Recovering easy and strong passwords
◦ Hardware acceleration methods
www.lostpassword.com
Multiple-core CPUs
Tableau TACC Hardware Accelerator - x25
GPU-based attacks (nVidia cards) – x20
Distributed password recovery
www.lostpassword.com
www.lostpassword.com
Multiple-core CPUs
Tableau TACC Hardware Accelerator - x25
GPU-based attacks (nVidia cards) – x20
Distributed password recovery
www.lostpassword.com
5000
4000
3000 CPU
2000 CPU+GPU
1000
0
MS Office 2007 RAR 3
www.lostpassword.com
Linear performance scalability
Each computer supports CPUs, GPUs, and
TACC accelerators simultaneously
Uses all types of password recovery attacks
www.lostpassword.com
www.lostpassword.com
Know the enemy - find out what is encrypted
and how
www.lostpassword.com
Questions?
Nataly Koukoushkina
+1 (650) 472-3716 x 101
nataly@passware.com
www.lostpassword.com/kit-forensic.htm
www.lostpassword.com
Handling Encrypted Evidence &
Password Recovery
Nataly Koukoushkina
June 2010
CCFC 2010, Workshop
Part I. Encrypted Evidence Discovery &
Decryption.
◦ Overview of encryption types
◦ Discovering encrypted evidence
◦ Recovering easy and strong passwords
◦ Hardware acceleration methods
www.lostpassword.com
BitLocker Drive Encryption is a full disk
encryption feature included with Windows
7/Vista Ultimate and Enterprise, and Server
2008. Provides encryption for entire volumes.
www.lostpassword.com
Encryption keys are located in computer
memory, while the volume is mounted, even
if the computer is locked
www.lostpassword.com
Preserve the state - do not turn off the computer
www.lostpassword.com
Part I. Encrypted Evidence Discovery &
Decryption.
◦ Overview of encryption types
◦ Discovering encrypted evidence
◦ Recovering easy and strong passwords
◦ Hardware acceleration methods
www.lostpassword.com
Passware Kit Forensic creates a bootable USB
flash drive with a portable memory imaging
tool (FireWire Memory Imager), which can be
used on any computer with a FireWire port
www.lostpassword.com
www.lostpassword.com
Part I. Encrypted Evidence Discovery &
Decryption.
◦ Overview of encryption types
◦ Discovering encrypted evidence
◦ Recovering easy and strong passwords
◦ Hardware acceleration methods
www.lostpassword.com
Extract encryption keys from the memory
Decrypt the disk with the keys
www.lostpassword.com
Original password recovery:
• Dictionary attack
• Xieve attack
• Brute-force attack
• Previous Passwords attack
• Any combination of attacks above
www.lostpassword.com
Don’t power off the target computer
HD encryption keys are stored in RAM
If the computer is shut down, use brute-force
password recovery attacks
www.lostpassword.com
Know the enemy - find out what is encrypted and
how
www.lostpassword.com
Questions?
Nataly Koukoushkina
+1 (650) 472-3716 x 101
nataly@passware.com
www.lostpassword.com/kit-forensic.htm
www.lostpassword.com