data forensics with...
 
Notifications
Clear all

data forensics with 2 luks encrypted hdd

3 Posts
3 Users
0 Reactions
714 Views
(@jannanar)
New Member
Joined: 6 years ago
Posts: 1
Topic starter  

I hope you understand what I mean

A person I know formatted the wrong usb stick and important passphrases are now lost. My best bet to find the passphrases is data forensics with a SSD and a HDD

the SSD had a fully working xubuntu installation, but I wanted to install another OS (qubes), but failed, so I installed xubuntu again. The passphrase file may be still in the unit. It was a standard installation, there was a passphrase (I still know it) and a password (I also still know it) to access it. The question here is should I decrypt and then make an image to try and recover data, or can I mount an encrypted unit with testdisk? I however dd 100% of it but encrypted.

the HDD had also a fully xubuntu installation. I also know the passphrase to access this HDD. I wanted to encrypt this HDD with luks to use as an external hdd (I mean, wipe out the xubuntu installation), but I couldnt pass the first step and just left the unit alone. The passphrase file may also be in this unit, so I need to also decrypt and make an image to work with (or mount and decrypt with testdisk). This unit fails a bit (I hear that dreadful clack sometimes) and I was able to dd just 85% of it.

help very much appreciated.


   
Quote
UnallocatedClusters
(@unallocatedclusters)
Honorable Member
Joined: 13 years ago
Posts: 576
 

Please PM Forensic Focus member TheFuf with your Linux question. TheFuf has the most Linux expertise of any person I am aware of as it relates to computer forensics.


   
ReplyQuote
watcher
(@watcher)
Estimable Member
Joined: 19 years ago
Posts: 125
 

I hope you understand what I mean

A person I know formatted the wrong usb stick and important passphrases are now lost. My best bet to find the passphrases is data forensics with a SSD and a HDD

the SSD had a fully working xubuntu installation, but I wanted to install another OS (qubes), but failed, so I installed xubuntu again. The passphrase file may be still in the unit. It was a standard installation, there was a passphrase (I still know it) and a password (I also still know it) to access it. The question here is should I decrypt and then make an image to try and recover data, or can I mount an encrypted unit with testdisk? I however dd 100% of it but encrypted.

the HDD had also a fully xubuntu installation. I also know the passphrase to access this HDD. I wanted to encrypt this HDD with luks to use as an external hdd (I mean, wipe out the xubuntu installation), but I couldnt pass the first step and just left the unit alone. The passphrase file may also be in this unit, so I need to also decrypt and make an image to work with (or mount and decrypt with testdisk). This unit fails a bit (I hear that dreadful clack sometimes) and I was able to dd just 85% of it.

help very much appreciated.

First off, if they simply quick formatted the usb stick, you have excellent chances of recovering the usb stick contents. I'd suggest trying that first.

For the rest, honestly I'm confused. You say you know the passphrase and password so I don't understand what you are asking for? Wiping an existing partition doesn't require passwords of any kind. I don't believe LUKS supports encrypting an existing partition and preserving content.


   
ReplyQuote
Share: