PGP Encrypted Drive...
 
Notifications
Clear all

PGP Encrypted Drive - I have the key

9 Posts
5 Users
0 Reactions
1,383 Views
(@jrobert)
Active Member
Joined: 13 years ago
Posts: 12
Topic starter  

I have imaged a drive that has PGA whole disk encryption and made a clone. I have the key and I can boot a cloned drive to the user login. I do not have the user login password so I cannot image the drive, live. How can I get past this? I have at my disposal, X-Ways. I have the free download of FTK imager, but it does not appear to handle this. I've attempted some boot CDs with forensic tools, but they are prevented from booting by PGP. I've attempted connecting with a crossover cable, but had no success in connecting to it. ANy help would be appreciated.

John
Wallingford, CT USA


   
Quote
(@belkasoft)
Estimable Member
Joined: 17 years ago
Posts: 169
 

Is there a particular reason you want to image the drive live? I believe you can image it offline with certain tools (e.g. Elcomsoft Forensic Disk Decryptor).


   
ReplyQuote
(@jrobert)
Active Member
Joined: 13 years ago
Posts: 12
Topic starter  

No particular reason to image live. I looked at Elcomsoft Forensic Disk Decryptor, but for the source for the key, the possibilities are 1. Memory dump 2. Hiberfile.sys 3. Saved key. All I have is the key in text form.

Thanks for the response.

John


   
ReplyQuote
(@belkasoft)
Estimable Member
Joined: 17 years ago
Posts: 169
 

Well, if I were you, I would just ask *them*… they might have a product like that, too.


   
ReplyQuote
jhup
 jhup
(@jhup)
Noble Member
Joined: 16 years ago
Posts: 1442
 

The best process I found for encrypted volumes, including PGP whole disk encryption (PGP) is slaving.

Take an encrypted target drive, remove it from the target machine.
Connect removed target drive to a master machine through write-blocker as a secondary, or even an external USB device.
The master machine has to have the en/decryption software installed. In this case PGP.
The OS drivers would recognize the slaved target drive as encrypted with PGP and ask for the pass.

In my experience, this is the same with BitLocker, Safeboot, Utimaco, etc.


   
ReplyQuote
(@jrobert)
Active Member
Joined: 13 years ago
Posts: 12
Topic starter  

I received the same suggestion from an associate. I installed PGP desktop and a cloned drive to my forensic machine through a write blocker. I started PGP desktop. It immediately recognized the drive. I keyed in the license key and it opened the drive!! It worked exactly as you described. Thanks!!

John


   
ReplyQuote
jhup
 jhup
(@jhup)
Noble Member
Joined: 16 years ago
Posts: 1442
 

Minor note - in some instances the cloned slave would not work, as some volume encryption tools "sign" the encryption with the device details such as serial number and similar to prevent exactly this scenario, cloning.


   
ReplyQuote
(@hommy0)
Trusted Member
Joined: 15 years ago
Posts: 98
 

If you have the key, EnCase Forensic with the Encryption Decryption Suite (part of EnCase 7) - should function.

Loading the image or previewed drive into entries, EnCase should prompt you for the PGP credentials. From here on in you will be able to examine the device in a decrypted state. Used it recently, was given the PGP pass-pharse and was able to extract files of relevance - via a writeblocker - without even imaging it!

If you do not wish to remove the drive from the machine - EnCase Portable has similar functionality.


   
ReplyQuote
(@vishu)
New Member
Joined: 15 years ago
Posts: 4
 

If you have the key, EnCase Forensic with the Encryption Decryption Suite (part of EnCase 7) - should function.

Loading the image or previewed drive into entries, EnCase should prompt you for the PGP credentials. From here on in you will be able to examine the device in a decrypted state. Used it recently, was given the PGP pass-pharse and was able to extract files of relevance - via a writeblocker - without even imaging it!

If you do not wish to remove the drive from the machine - EnCase Portable has similar functionality.

Hommy is your method also facilitates to make an unencrypted image of a PGP encrypted drive once it decrypted on Encase7 ? I am asking you this because there are still many limitation in Encase7 in terms of features that still encourage to review the image on Encase6. ?


   
ReplyQuote
Share: