The poor quality photograph and lack of information on the website doesn't exactly fill me with confidence! And it only works with Seagate?
The poor quality photograph and lack of information on the website doesn't exactly fill me with confidence! And it only works with Seagate?
Andy have you found a solution to the ATA password removal?
My IBM HDD is a useless paper weight!
For the purposes of 'Forensic Computing', actually cracking the password/security is not necessary. Read my previous posts on the subject, for a solution to creating a forensically sound copy of a hard drive, protected in such a manner.
First time posters, who advertise their products, without offering any explanation/knowledge, or engage in any discussion - smacks to me of 'snake oil'.
Andy
Vogon has a password cracking pod that is capable of removing manufacturer and user applied passwords from certian platter-locked hard-drives. Also, in regards to HPA's, our imaging software will see the area as hidden-blocks and will image them.
Please don't consider my response a sales pitch.
Most forensic imaging software will image HPA's such as EnCase, FTK, Linux DD, etc. The HPA isn't therefore a problem. The crux of this post is defeating the security built into the ATA standard…..
Vogon may have a device capable of cracking a protected drive password, but what is the price?
Andy
For the purposes of 'Forensic Computing', actually cracking the password/security is not necessary. Read my previous posts on the subject, for a solution to creating a forensically sound copy of a hard drive, protected in such a manner.
Andy
Dear Andy,
I read your previous post on using grab/dd for imaging an ATA-3 protected drive. But you mentioned that you actually possess the password. Did you use that knowledge to (first) unlock the drive and (second) image it?
David.
there is no chance to make an image while the pwd is there.
Who is saing that is a layer.
Nikola
there is no chance to make an image while the pwd is there.
Who is saing that is a layer.
Nikola
Well, I've never done this, but the problem seems to be how can you trick enough the HDD controller to make it think there is no (or no more) password.
To achieve it, I would try these steps to access HDD1 protected via an unknown password
1. find an equivalent HDD (HDD2) with the same controller card;
2. either protect HDD2 with a password or no (but remember it);
3. make a physical connection from the HDD2 controller in order to control the motors of both HDD1 and HDD2;
4. the data/command connections are still set from the HDD2 controller to HDD2;
5. power ON;
6. the HDD2 controller checks on HDD2 if a password need to be prompted, if yes enter the password, and HDD2 is unlocked;
7. when the disk activity is null, unplug the data/command connections from HDD2;
8. plug the data/command connections to HDD1, which is now linked to the HDD2 controller.
Then, with a bit of chance, the controller still thinks that the drive HDD1 is unlocked whereas HDD1 has not be unlocked.
Has anybody tried this?
David.
I regret to inform you that your very complicated way of by-passing ATA password protection will not work.
Unfortunately the ATA security set is not as simple as that, the password is part of the drive firmware, loaded during initialisation (if set) and prevents access to the data area entirely.
Hard drives that are protected in this way are imagable, but only once the password is removed completely, to do this you need to re-write portions of the drive firmware.
If anybody needs a hard disk unlocking please let me know, we have developed ways of removing most passwords, IBM's are a specialty 😉
Cool, what is the name of your company? Do you have a web presence?
Andy