![]() ![]() ![]() From what the article explains most WD encryption works like this: User password is used to generate Key Encryption Key (KEK) KEK is then used to encrypt Disk Encryption Key (DEK - what we normally use to decrypt data) This results in a eDEK which can be read the normal way by PC-3000 in lieu of the DEK (which was replaced with the eDEK). Perhaps something like this: only homemade.Īccording to it seems that it's totally doable to crack the user password once you have the key sector stored in the SA. ![]() So I'm considering looking into setting up a hardware brute force decryption machine for the purpose of breaking WD's encryption. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |