|
Message-ID: <CACS=PG4SWuqtE_=X=s4At4P8t-t_KnAXkmJ-az6ejFnid5adzA@mail.gmail.com> Date: Wed, 8 Jul 2015 12:27:08 -0400 From: Jon Jaffe <joncjaffe@...il.com> To: john-users@...ts.openwall.com Subject: Re: RES: Break a virtual drive You're only chance is to recover the partition which might allow you full access to the drive and from their you can decrypt the contents as you normally would. I use testdisk for this, theres a step-by step guide about half way down the page. http://www.cgsecurity.org/wiki/TestDisk More about : recovering data password protected volumes external hard drive <http://www.tomshardware.com/s/recovering+data+password+protected+volumes+external+hard+drive/> - I possibly fried an external hard drive and need help recovering the data, please. <http://www.tomshardware.com/answers/id-2400953/possibly-fried-external-hard-drive-recovering-data.html> - Tech Support - Recovering data from external hard drive <http://www.tomshardware.com/answers/id-2534335/recovering-data-external-hard-drive.html> - Tech Support - I need help with recovering data from an external hard drive that was in a raid. <http://www.tomshardware.com/answers/id-2272580/recovering-data-external-hard-drive-raid.html> - Tech Support - Question About Recovering Data from External Hard Drive <http://www.tomshardware.com/answers/id-2045795/question-recovering-data-external-hard-drive.html> - Tech Support - recovering data from external hard drive <http://www.tomshardware.com/answers/id-1955741/recovering-data-external-hard-drive.html> - Tech Support - See all contents in "recovering data password protected volumes external hard drive" <http://www.tomshardware.com/forum/all.html?refine=recovering+data+password+protected+volumes+external+hard+drive> <http://www.tomshardware.com/s/recovering+data+password+protected+volumes+external+hard+drive/> <http://www.tomshardware.com/s/recovering+data+password+protected+volumes+external+hard+drive/> On Tue, Jul 7, 2015 at 2:31 PM, <alexandre_drake@...oo.com.br> wrote: > Marek, > > Yes my first impulse was to contact Samsung`s tech support but I found a > kind of site where consumers complained about various products and there > was a reclamation of one very alike. They answered that this kind of > support is given by Seagate and the consumer opened a reclamation to > Seagate who answered that there was "no recover pass service". > Well, the second way is also very difficult as the pass was made by a > software called Keeppass which is include in a Mozilla Suite which is > inaccessible since my pen drive was broken in its USB cradle. > As you see my only hope is some kind of "brute force" software to do the > job but even with this solution I need to know first how long does it take > and the "robot" must be also clever enough to save the trials log in order > to continue since the last tentative done (just in case I have to shut down > the note or other electric matter. > > -----Mensagem original----- > De: Marek Wrzosek [mailto:marek.wrzosek@...il.com] > Enviada em: terça-feira, 7 de julho de 2015 14:20 > Para: john-users@...ts.openwall.com > Assunto: Re: RES: [john-users] Break a virtual drive > > Hi Alexandre, > > I also don't know if I've understood completely Jon's response, but I > think it was about some BIOS locked HDD. Samsung SecretZone seems similar > to truecrypt but truecrypt was well documented and SecretZone is Samsung's > own solution. To crack password you would need the hash and algorithm that > was used to create it. Here is a problem - only Samsung knows where this > hash is stored/how to extract it and I don't know if they will be willing > to disclose this information to the public. Of course you can try to > contact Samsung's tech support for this information. The speed of cracking > would depend on what algorithm was used to create the hash, if it was HMAC > with thousands of iterations (like in case of truecrypt), then cracking > will be extremely time consuming, other way they won't even tell you how to > extract that hash. > It seems that the only way to recover passwords for disc encryption is > trying to recall what the password was/how did you created it. :( > > Best Regards > > W dniu 07.07.2015 o 17:22, alexandre_drake@...oo.com.br pisze: > > Thank you Jon for your response but I am afraid I didn`t have it > completely understood. I have this Hiren`s Boot CD but I`m not sure how to > unlock the HDD. The Hirens have many programs inside it. Which one do you > use to do the job first ? > > > > -----Mensagem original----- > > De: Jon Jaffe [mailto:joncjaffe@...il.com] Enviada em: terça-feira, 7 > > de julho de 2015 12:02 > > Para: john-users@...ts.openwall.com > > Assunto: Re: [john-users] Break a virtual drive > > > > It's a *hirens bootCD*, free to download lol google it. I am using > > *Hiren's Boot CD* to unlock it. I am able to go to Unlock and it says > > "done" with a > > 0000 code for both user *password* or master *password*. .... BIOS in > which I got a hash which I *used to reset* an *HDD* just two weeks ago. > > > > > > https://www.youtube.com/watch?v=R1hfKeEvsn4 > > > > On Tue, Jul 7, 2015 at 8:46 AM, Dhiru Kholia <dhiru.kholia@...il.com> > wrote: > > > >> On Tue, Jul 7, 2015 at 12:33 PM, <alexandre_drake@...oo.com.br> wrote: > >>> > >>> I lost the password of the Secret Zone in my external Samsung HD. > >> > >> Samsung SecretZone is not supported by JtR, currently. > >> > >>> Well, I know my password has no more than 7 or 8 digits but I am not > >> familiar with the technics of breaking passwords. I thought to use a > >> "brute force" software but have read that would need a dump archive > >> and have no idea how to extract it from the HD software. > >> > >> SecretZone seems like GUI program, so maybe a small AutoIt script (to > >> do the brute-forcing against the SecretZone GUI program) would do the > >> job? > >> > >> Dhiru > >> > > > > -- > Marek Wrzosek > marek.wrzosek@...il.com > >
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.