bootloader data acq...
 
Notifications
Clear all

bootloader data acquisition !!

62 Posts
8 Users
0 Reactions
9,524 Views
(@tinybrain)
Reputable Member
Joined: 9 years ago
Posts: 354
 

See here

http//www.mdpi.com/symmetry/symmetry-10-00023/article_deploy/html/images/symmetry-10-00023-g004.png

The article to learn from is here

http//www.mdpi.com/2073-8994/10/1/23/htm


   
ReplyQuote
(@evilcode1)
Estimable Member
Joined: 10 years ago
Posts: 157
Topic starter  

See here

http//www.mdpi.com/symmetry/symmetry-10-00023/article_deploy/html/images/symmetry-10-00023-g004.png

The article to learn from is here

http//www.mdpi.com/2073-8994/10/1/23/htm

this is an advanced topic …. I am confused there is a lot of mathematical equations … but i search a lot on google … what i understand is

some of experet's said there is an exploit in Qualcomm's processors allow u to extract the master key for FDE ….
the article is here http//bits-please.blogspot.com/2016/06/extracting-qualcomms-keymaster-keys.html

and other expert told me that

Your device model has encrypted user data partition, so even after creating a physical dump, the data is mostly encrypted junk, which needs to be decrypted. In most of the cases the decryption is possible with dictionary attacks and brute force using our own in-lab technology, but it takes time, CPU+GPU cluster power and electrical energy.

We finished a successful decryption of an Android 6.0.1 data partition at the end of the last month

how we can do that what is the tools and hardware needed for perform this types of attack


   
ReplyQuote
(@tinybrain)
Reputable Member
Joined: 9 years ago
Posts: 354
 

The blogspot article is fine in its approach. You need CPU and GPU cluster power. The best is you rent AWS server power which is scaleable by your need in relation to time and money, see here

https://docs.aws.amazon.com/AmazonECS/latest/developerguide/ECS_clusters.html

By bundling power by clusters you can run the rainbow table and brute force attacks to decrypt.


   
ReplyQuote
(@evilcode1)
Estimable Member
Joined: 10 years ago
Posts: 157
Topic starter  

The blogspot article is fine in its approach. You need CPU and GPU cluster power. The best is you rent AWS server power which is scaleable by your need in relation to time and money, see here

https://docs.aws.amazon.com/AmazonECS/latest/developerguide/ECS_clusters.html

By bundling power by clusters you can run the rainbow table and brute force attacks to decrypt.

what to attack exactly userdata.img ? and how this done by which tool ?
and if i attack what i get ? PIN code or encryption key ?
burteforce is the only solution for encrypted images ? i mean is there other methods in forensics company ?

sorry for a lot of questions <3


   
ReplyQuote
(@tinybrain)
Reputable Member
Joined: 9 years ago
Posts: 354
 

You are welcome, no problem about questions. As a cryptographer by myself its difficult to explain, we of course have professional tools and scalable resources inhouse. May someone else on Forensic Focus can better explain to you, sorry for that.

Who can help this member, please?


   
ReplyQuote
Bolo
 Bolo
(@bolo)
Trusted Member
Joined: 9 years ago
Posts: 97
 

if you want to understand basic of FDE I think the best was explained by László Tóth and Ferenc Spala - look here https://soonerorlater.hu/download/They_thinked_differently_DerbyCon2013.pdf

P.S
It's reflect to FDE 1.0 …after this you can find resources on Internet up to 1.3… future analysis to crack higher version you will need to make at your own


   
ReplyQuote
jaclaz
(@jaclaz)
Illustrious Member
Joined: 18 years ago
Posts: 5133
 

The best is you rent AWS server power which is scaleable by your need in relation to time and money …

With all due respect ) , it seems to me a lot like the SouthPark gnomes plan to get rich

Phase 1) Get AWS computing power
Phase 2) ?
Phase 3) Profit!

😯

jaclaz


   
ReplyQuote
(@tinybrain)
Reputable Member
Joined: 9 years ago
Posts: 354
 

Can please someone help this guy with his serious problem?


   
ReplyQuote
(@evilcode1)
Estimable Member
Joined: 10 years ago
Posts: 157
Topic starter  

if you want to understand basic of FDE I think the best was explained by László Tóth and Ferenc Spala - look here https://soonerorlater.hu/download/They_thinked_differently_DerbyCon2013.pdf

P.S
It's reflect to FDE 1.0 …after this you can find resources on Internet up to 1.3… future analysis to crack higher version you will need to make at your own

that topic help me to understand what happen with android encryption … but it's not work with my case i fallow this guide

source http//www.forensicswiki.org/wiki/How_To_Decrypt_Android_Full_Disk_Encryption

o what is the next step should i go to elcomsoft or magnet or whatever ?? do they have the ability to crack android encryption images ?


   
ReplyQuote
Bolo
 Bolo
(@bolo)
Trusted Member
Joined: 9 years ago
Posts: 97
 

Upload dump to your FTP and give me access for it - I will check this case and update you on PM.


   
ReplyQuote
Page 3 / 7
Share: