Forensic Decryption of FAT
Forensic Decryption of FAT
Forensic Decryption of FAT
BitLocker Volumes
1 Introduction
Volumes encrypted with BitLocker will have a different signature than the standard
NTFS header. Instead, they have in their volume header (first sector): 2D 46 56 45 2D
46 53 2D or, in ASCII, -FVE-FS-.
These volumes can be identified by the BitLocker GUID/UUID: 4967d63b-2e29-
4ad8-8399-f6a339e3d00.
The actual data on the encrypted volume is protected with either 128-bit or 256-bit
AES or optionally diffused using an algorithm called Elephant. The key used to do the
encryption, the Full Volume Encryption Key (FVEK) and/or TWEAK key, is stored in
the BitLocker metadata on the protected volume. The FVEK and/or TWEAK keys are
encrypted using another key, namely the Volume Master Key (VMK). Several copies
of the VMK are also stored in the metadata. Each copy of the VMK is encrypted using
another key; also know as key-protector key. Some of the key-protectors are:
• TPM (Trusted Platform Module)
• Smart card
• recovery password
© Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2014
P. Gladyshev et al. (Eds.): ICDF2C 2013, LNICST 132, pp. 17–29, 2014.
DOI: 10.1007/978-3-319-14289-0_2
18 P. Shabana Subair et al.
• start-up key
• clear key; this key-protector provides no protection
• user password
BitLocker has support for partial encrypted volumes.
1.1 BitLocker To Go
BitLocker To Go is a full-disk encryption protection technology for removable storage
devices. Though it is based on BitLocker technology, BitLocker To Go significantly
enhances the technical capabilities of BitLocker. For example, it is compatible with all
FAT (FAT32, exFAT, etc.) file systems in addition to NTFS, dramatically increasing
its compatibility with existing devices.
Volumes encrypted with BitLocker To Go will have a hybrid encrypted volume,
meaning that part of the volume is unencrypted and contains applications to unlock the
volume and the other part of the volume is encrypted. The “discovery drive” volume
contains BitLocker To Go Reader to read from encrypted volumes on versions of
Microsoft Windows without BitLocker support.
BitLocker To Go is designed primarily for enterprises, where there is serious risk of
a user bringing an unprotected storage device into the environment, copying important
corporate information (inadvertently or not) to it, and then losing the device outside of
the workplace. USB memory keys, in particular, are small and convenient, and quite
popular, but they’re also easily lost. With BitLocker To Go enabled on the device, one
can help protect sensitive corporate–or, for that matter, personal–data in the event of
loss or theft.
BitLocker To Go works completely independently of BitLocker, so you do not
need to enable BitLocker on the PC, or utilize any TPM hardware, in order to use
BitLocker To Go. In use, however, it is similar to BitLocker, and can also be enabled
via a simple right-click menu choice.
This paper contains the details necessary to access Bitlocker protected FAT vol-
umes. It describes the Bitlocker recovery information like the BitLocker keys, the
encryption methods, the details of volume header, the metadata block and about the
metadata header and metadata entries. Finally this paper presents the steps to unlock a
BitLocker FAT32 volume.
access the FVEK is encrypted with the Volume Master Key (VMK). The size of the
FVEK is dependent on the encryption method used i.e. FVEK is 128-bit of size for
AES 128-bit and FVEK is 256-bit for AES 256-bit.
Fig. 1. The data showing the metadata block offsets in the Volume header [4]
the examiner should assume the smallest legal values and thus search for the BitLocker
signature at multiples of 512 bytes.
Each FVE metadata block consists of:
1. A FVE metadata block header
2. A FVE metadata header.
3. An array of FVE metadata entries
Each Bitlocker metadata block begins with a variation length header followed by a
variable number of entries. The FVE metadata block header contains the offset of the
original boot sector. When decrypting, BitLocker will decrypt from the back to
the front. The encrypted volume size at offset 16 contains the number of bytes of the
volume that are encrypted or need to be decrypted (Fig. 2).
In this section we describe the steps needed to decrypt and load a FAT bitlocked
volume. Here an evidence file that has two partitions has been taken where one is
FAT32 volume that is bitlocked. The.txt file having the recovery password and a.bek
file having the external key which is generated are stored on some external drive. Both
these files are used for the recovery process and using these keys, the VMK and FVEK
are derived. The process is same for all the other FAT file systems.
Fig. 4. The .txt file showing the GUID and the 48 digit recovery key
As described in Sect. 2, the individual 16-bit values make up a 128-bit key. The
corresponding recovery key is calculated using the following approach:
Initialize both the last SHA256 and the count to 0. Calculate the SHA256 of the 128-bit
key and update the initial SHA256 value. The salt is stored on disk in the stretch key
which is stored in the recovery key protected Volume Master Key (VMK). Loop for
1048576 (0 × 100000) times:
• calculate the SHA256 of the structure and update the last SHA256 value
• increment the count by 1
The last SHA256 value contains the 256-bit key which is recovery key that can unlock
the recovery key protected Volume Master Key (VMK).
The encrypted data is decrypted using the VMK and the type of algorithm as
specified in the metadata entry. Finally the FVEK has been derived which is used to
decrypt the data at rest.
sectors are decrypted and written in the same order starting from the boot sector until
the encrypted size limit is reached. If the total number of sector is less than the
encrypted volume size then there will be no problem. But if the total number of sectors
is greater than the encrypted volume size, then the next corresponding sector should be
the corresponding sector from the start of the volume header and so on.
For example, for the above evidence, if the volume header starts at sector 63, the
original sector starts at sector 1404, the total number of sectors as 2506 and
the encrypted volume size is 1009 sectors. Then while decrypting the sector 1404 (the
original boot sector becomes the 63 sector), sector 1405 becomes sector 64 and so on
up to sector 2413 since the encrypted volume size has reached. Then to get the sector
2414, we start at sector 63 and add up to the number of sectors covered (i.e. 1009). So
the sector 1072 becomes the 2414 sector (63 (volume header sector) + 1009 (encrypted
volume size)). In this manner, the sectors are decrypted and arranged to get the un-
bitlocked drive.
28 P. Shabana Subair et al.
4 Conclusion
References
1. Kumar, N., Kumar, V.: Bitlocker and Windows Vista, May 2008. http://www.nvlabs.in/
node/9
2. Microsoft Corporation. Bitlocker drive encryption technical overview. Technical report,
Microsoft Corporation, May 2008. http://technet2microsoft.com/WindowsVista/en/library/
ce4d5a2e-59a5-4742-89cc-ef9f5908b4731033.mspx?mfr=true
Forensic Decryption of FAT BitLocker Volumes 29
3. Kornblum, J.D.: Implementing Bitlocker Drive Encryption For Forensic Analysis, ManTech
International Corporation. jessekornblum.com/publications/di09.pdf
4. Metz, J.: Bitlocker Drive Encryption (BDE) format specification: Analysis of the BitLocker
Drive Encryption (BDE) volume
5. Kornblum, J.D.: Bitlocker To Go, ManTech International Corporation. http://jessekornblum.
com/presentations/dodcc10-1.pdf
http://www.springer.com/978-3-319-14288-3