Blackberry Passcode...
 
Notifications
Clear all

Blackberry Passcode Cracker

4 Posts
3 Users
0 Reactions
1,310 Views
(@thepm)
Reputable Member
Joined: 17 years ago
Posts: 254
Topic starter  

Hi everyone, I just heard that ElcomSoft has released a Blackberry / iPhone backup password cracker (http//www.elcomsoft.com/eppb.html). Here, we have a lot of issues with locked/encrypted BB devices. I personally don't have much experience with those devices, so I seek your help

- If I crack the Blackberry backup passcode, will this give me the password to unlock/decrypt the device itself? Are those 2 passcodes identical?

- If I have an encrypted/locked Blackberry, can I still create a backup without having the lock code?

Thanks


   
Quote
bigjon
(@bigjon)
Estimable Member
Joined: 17 years ago
Posts: 159
 

Hitman, short answer…..NO
I have been in touch with Elcomsoft and the solution is as follows
First, your device (iPhone/iPad) can be protected with passcode preventing you from (a) unlocking it and accessing Home screen and (b) connecting it to iTunes and reading backup for later examination (unless this device was paired with this iTunes before). EPPB will be of no help in this situation – it can't remove/recover passcode lock.

However you might get a device which is not passcode protected but which is set up to encrypt backups. You'll be able to connect it to iTunes and read backup, but it will be encrypted. EPPB is designed to recover passwords for such backups.

The release of the BB set up is exactly the same


   
ReplyQuote
(@thepm)
Reputable Member
Joined: 17 years ago
Posts: 254
Topic starter  

Alright bigjon, thanks for the details.


   
ReplyQuote
(@burratha)
Eminent Member
Joined: 18 years ago
Posts: 43
 

bigjon - thanks for that answer, which was very interesting relating to the iPads and iPhones that are received for examination, but the OP asked about BlackBerry devices which are totally different.

Elcomsoft are able to crack the password that a user (voluntarily) uses to secure IPD backups, made by the BlackBerry Desktop Software on their PC (or equivalent on a mac) and save somewhere on their computers/network/whatever. The software uses a brute force methodology (AFAIA) and was tested against a relatively straightforward key.

An interesting read about the process can be found here -> http//www.berryreview.com/2010/10/04/blackberry-backups-susceptible-to-brute-force-attack/#more-41524

BlackBerry Backups Susceptible to Brute Force Attack

InfoWorld ran a story about ElcomSoft’s announcement of support for BlackBerry backups in their backup file decrypting tool. Obviously all the lemmings ran for the hills and the little red hen ran screaming that the sky has fallen! I did a bit of digging and found that while ElcomSoft has a point that BlackBerry backup’s are insecure I don’t think it is a huge deal and is something RIM could probably fix with little work but it is a weird oversight for a company so a**l retentive about security. I would consider this a shameful black eye for their security team.

To give you some perspective it is almost impossible to truly protect a consumer backup file from a brute force password attack. A brute force attack essentially just tries billions and trillions of passwords and permutations until one works. With a device like the BlackBerry it is easy to set a 10 wrong password limit before wiping the device but with a backup file a hacker can just make a billion copies of the file and keep on hacking away.

What I found very interesting is that in this one regard RIM is actually trailing Apple when it comes to backup file security. Both of the companies use AES encryption with a 256-bit key which is pretty good though the key is derived from a user supplied password which is where the vulnerability comes from. Standard practice for key strengthening user supplied passwords for AES involves PBKDF2 which strengthens the keys by making it harder and more processor intensive to brute force a password. It uses a salt along with this value for over 1000+ recommended iterations to create derived keys which make it really hard to try multiple passwords. They need the salt to make it harder to use rainbow tables to just easily find a password from its hash.

So now that we know that PBKDF2 is supposed to be used at least 1000+ times as a recommended MINIMUM we learn that RIM only uses ONE iteration. That makes it MUCH easier to brute force in around 3 days. It is also way behind the curve since the iPhone OS 4.x uses 10,000 iterations and the 3.x iOS uses 2,000. The other difference is that RIM only encrypts the data once it is transferred in clear text to your computer adding another place where this data is at risk.

Many companies with a BES implementation could care less about this since most information is backed up to the BES and users have no real need of performing backups. BES admins can even block these backup’s if they thing there is a risk from it. I am not sure if this is also the case for device upgrades that perform a backup but I assume that it is. On the other hand consumers, who usually do not have a password or data encryption on in the first place, will probably not care too much though it is valuable to know not to share your backups all over the internet. I think that the encryption of backups was only a recent addition and only added in recent versions of desktop manager but that could be why it has such an immature level of protection. Still I don’t doubt that RIM will release a patch or update for this soon.

So no the sky is not falling though keep in mind there are still people who can read your email… and just because you are not paranoid does not mean no one is out to get you.

Please note - this password is independent to a device password, and its content and complexity is chosen at the point of creating the password by the user.

Bear in mind, I'd suggest the majority of BlackBerry users don't make backups - I'd even guess that many don't even know how to; I'd suggest the only people who do are the more-capable users who back up their device when performing an OS update, or when transferring information when changing device. There are many organisations (mine included) which don't allow the use of USB ports, nor the installation of non-approved software for standard users, so there would be no IPD files from them…..

Back to the point, and to answer the questions

1) No. both passwords are independent. (the user *may* have chosen to use the same password, however)

2) No. In order to connect a device to the BlackBerry Desktop Manager software, the device password has to be known.


   
ReplyQuote
Share: