Notifications
Clear all

IronKey

6 Posts
4 Users
0 Reactions
1,499 Views
(@thepm)
Reputable Member
Joined: 17 years ago
Posts: 254
Topic starter  

Working a case where the suspect has 2 Ironkey flash drives.

AFAIK, those devices are pretty air tight. I contacted Ironkey to see if they could help me get access to the data (with a warrant) and they responded that it was impossible (of course).

So, I'm coming to you guys before throwing the towel. Does anybody have any idea if the Ironkey can be analyzed in any way without knowing the password?

Thanks


   
Quote
(@rich2005)
Honorable Member
Joined: 19 years ago
Posts: 541
 

Don't know, but it's always worth trying the social engineering route. People re-use passwords, so try obtaining every other easier password you can from any source and trying them (pc/notes/etc).
I suspect you're out of luck as the devices look pretty good (but don't know for sure).


   
ReplyQuote
(@thepm)
Reputable Member
Joined: 17 years ago
Posts: 254
Topic starter  

One problem with the Ironkey is that you can only try 10 passwords. After that, the device becomes unusable. It kinda limits the passwords I can try.

Thanks.


   
ReplyQuote
(@billethridge)
Active Member
Joined: 14 years ago
Posts: 12
 

I personally own two IronKeys. I have tried every thing known to access them without the pass keys. If you can gain access to the computer the Ironkey was set up with you might could break other passwords there and hope they reused them.


   
ReplyQuote
erowe
(@erowe)
Estimable Member
Joined: 18 years ago
Posts: 144
 

In a live analysis course I was giving about a year or so ago, one of the participants found his Ironkey password in the machine's memory dump (much to his chagrin). We didn't spend time looking for indicators to locate the password however - he just did a string search for it.

You might want to do some testing on an Ironkey of your own if you have one. Perhaps isolate and extract the process that uses the password to unlock the USB.

If you find a way to locate the key, you could then look through your suspect's machine's memory dump, pagefile, or hibernation file to see if the password is in there.

(Actually sounds like a good summer project for me to work on unless the folks at Ironkey are on to this and now wiping memory the way TrueCrypt does when volumes are dismounted…)


   
ReplyQuote
(@thepm)
Reputable Member
Joined: 17 years ago
Posts: 254
Topic starter  

I personally own two IronKeys. I have tried every thing known to access them without the pass keys. If you can gain access to the computer the Ironkey was set up with you might could break other passwords there and hope they reused them.

That was my idea too. My problem is that the suspect's machine is encrypted with TrueCrypt WDE. So I have to figure out a way to access that machine first… Very easy and simple case… hehe

Thanks


   
ReplyQuote
Share: