Notifications
Clear all

Encrypted USB drive

8 Posts
4 Users
0 Reactions
1,288 Views
(@konan)
New Member
Joined: 13 years ago
Posts: 2
Topic starter  

Sorry, I should get a copy of a crypto usb drive (type
http//www.integralmemory.com/product/crypto-drive-fips-197-encrypted-usb)

I tried using the linux distro deft and tools dd and guymager,
but both have made a copy of the partition 4 mb where is stored
the management software.

Could you kindly,
explain how to copy the entire pen drive?

Thanks


   
Quote
jhup
 jhup
(@jhup)
Noble Member
Joined: 16 years ago
Posts: 1442
 

[sorry wrong thread - was for the Asus Nexus 7 topic] oops


   
ReplyQuote
jaclaz
(@jaclaz)
Illustrious Member
Joined: 18 years ago
Posts: 5133
 

Alternatively there are quick rooting instructions over at XDA Developers.

WHERE exactly? ?

Rooting a USB stick, I guess it's a new frontier…. roll
Of course rooting a USB stick equipped with DDR3 RAM is probably feasible…. wink

jaclaz


   
ReplyQuote
(@Anonymous 6593)
Guest
Joined: 17 years ago
Posts: 1158
 

Could you kindly, explain how to copy the entire pen drive?

I examined a number of U3 drives once (SanDisk, Kingston and another brand) – if the drive you mentioned are anything like them, you probably won't be able to.

Typically, what appears to be a USB memory device, actually behaves like an intelligent USB huB. (See wikipedia article on U3). There are really two devices the one you see when you insert the stick into a computer, and the one that is made available as a removeable device once you give the password. While the second part is physically on the device, the 'open' device doesn't expose that part. If it is a U3 device, the U3 SDK can be used to play around with some of the functionality.

There has been cracks in one case, it was possible to do patch the code of the launch app so that a failed login was followed by the equivalent of a mount command. It should have failed, but for some reason it didn't. You could discover that one by learning the SDK and disassembling the login program, and then just experimenting wildly. There may be similar problems with this one.

It could also be a simpler design – in which case you probably could pick up the clues by disassembling and also tracing the execution of the program that asks for the password, and (probably) hands it over to the device.

And you may get lucky – check the password hint data for info. Or call customer support with a sob story about a forgotten password and convince them to give you the master password (assuming there is one). Or there just might be a backdoor for LE – but then you'd probably have to go through the formal channels to find that out.


   
ReplyQuote
jhup
 jhup
(@jhup)
Noble Member
Joined: 16 years ago
Posts: 1442
 

Curse of opening messages by tab… oops

Alternatively there are quick rooting instructions over at XDA Developers.

WHERE exactly? ?

Rooting a USB stick, I guess it's a new frontier…. roll
Of course rooting a USB stick equipped with DDR3 RAM is probably feasible…. wink

jaclaz


   
ReplyQuote
jaclaz
(@jaclaz)
Illustrious Member
Joined: 18 years ago
Posts: 5133
 

Could you kindly, explain how to copy the entire pen drive?

I examined a number of U3 drives once (SanDisk, Kingston and another brand) – if the drive you mentioned are anything like them, you probably won't be able to.

Typically, what appears to be a USB memory device, actually behaves like an intelligent USB huB. (See wikipedia article on U3). There are really two devices the one you see when you insert the stick into a computer, and the one that is made available as a removeable device once you give the password. While the second part is physically on the device, the 'open' device doesn't expose that part. If it is a U3 device, the U3 SDK can be used to play around with some of the functionality.

Yes and no, meaning yes ) most USB stick controller have the possibility to connect two LUN's (think of the old SCSI) but no, that has nothing or very little to do with U3.

U3 is (was) an attempt to give a nice sounding commercial name to the above feature.

Typically a U3 USB stick is set so that the two devices are a CD and a removable "drive", but usually the controller gives more possibilities.

In the case of U3 BOTH devices are accessible, one as CD and one as "drive".

Most USB sticks can also "partition" one of the two devices in a "normal" volume and in a "password protected" one.

The stick at hand, being seemingly a "high security" one, probably uses an internal firmware to either make only one device visible or completely hide a volume (or both) until the password is given.

IF the firmware is anyway like well written, and if a specific tool from the chip manufacturer is not available, the only way to image the contents is to do a chip-off.

But then you will have RAW data, which is complex enough even when non encrypted, if the actual data is actually encrypted you won't get anything from it anyway. (

jaclaz


   
ReplyQuote
(@Anonymous 6593)
Guest
Joined: 17 years ago
Posts: 1158
 

I examined a number of U3 drives once (SanDisk, Kingston and another brand) – if the drive you mentioned are anything like them, you probably won't be able to.

I can confirm that the Integral Crypto device looks very much like the older U3 devices. It doesn't say so anywhere in the usual places, but it does respond to many of the standard queries passed through the u3dapi10.dll, including quering it for device capability.

My copy of that .dll file is rather old – the non-responsive calls could easily be explained by software updates and API differences since 2007.


   
ReplyQuote
(@konan)
New Member
Joined: 13 years ago
Posts: 2
Topic starter  

I bought a similar key for testing.
I will try first to use this tool "http//u3-tool.sourceforge.net/";
then go on to examine the code of the exe file (reverse engineering)

here are some references
http//www.syss.de/fileadmin/ressources/040_veroeffentlichungen/dokumente/SySS_Cracks_Yet_Another_USB_Flash_Drive.pdf

https://www.syss.de/fileadmin/ressources/040_veroeffentlichungen/dokumente/SySS_Cracks_SanDisk_USB_Flash_Drive.pdf

See you soon D D D


   
ReplyQuote
Share: