whoosh

Cooler King
Staff member
Joined
Apr 15, 2009
Messages
47,660
First commercial tool to crack BitLocker arrives (Updated)

Passware a software firm that provides password recovery, decryption, and evidence discovery software for computer forensics, has updated its flagship application this week to support breaking Microsoft's BitLocker hard drive encryption. Passware Kit Forensic version 9.5 can recover encryption keys for hard drives protected with BitLocker in just a few minutes. It scans a physical memory image file of the target computer and extracts all the encryption keys for a given BitLocker disk. As a result, Passware has crowned itself the creator of the first commercially available software to crack BitLocker Drive Encryption.

Passware claims that full disk encryption was a major problem for investigators and that its tool helps police, law enforcement, and private investigators bypass BitLocker encryption for seized computers. That may be, but since this is a commercially available product, anyone with $795 can now circumvent the encryption. Add to that the fact that previous versions of this software have been pirated (version 9.0 was released earlier this year), and it's only a matter of time before even the price point doesn't matter.
Passware Kit Forensic is a tool that can recover passwords from various file types, decrypt Microsoft Word and Excel files up to version 2003, and reset passwords for local and domain Windows administrators. It is a complete encrypted evidence discovery solution that reports all password-protected items on a computer and gains access to these items using the fastest decryption and password recovery algorithms at its disposal. There's also a portable version of the software that runs from a USB drive and finds encrypted files, plus recovers files and website passwords without making any changes to the target computer.
BitLocker Drive Encryption is a full disk encryption feature available in the Ultimate and Enterprise editions of Windows Vista and Windows 7, as well as the Windows Server 2008 and Windows Server 2008 R2 operating systems. It is designed to protect data by providing encryption for entire volumes. By default, it uses the AES encryption algorithm in CBC mode with a 128 bit-key, combined with the Elephant diffuser for additional disk encryption security not provided by AES. It is meant to prevent a thief or thieves from using another operating system or hacking tool to get around file and system protections provided by Windows in order to view files stored on the drive.
 

whoosh said:
http://arstechnica.com/microsoft/news/2009/12/first-commercial-tool-cracks-bitlocker.ars
Passware, a software firm specializing in password recovery, decryption, and evidence discovery tools, has updated its flagship application—Passware Kit Forensic version 9.5—to support breaking Microsoft's BitLocker full disk encryption. The tool works by scanning a physical memory image of the target computer to extract encryption keys, thereby bypassing BitLocker's protection in just a few minutes.
While the firm positions this capability as a boon for police, law enforcement, and private investigators—making investigations of encrypted data much more efficient—it also raises significant concerns about security and misuse. After all, with this tool available commercially for $795, the possibility arises that it could eventually fall into the wrong hands, especially given that earlier versions (like version 9.0) have already seen widespread piracy.
It’s a classic double-edged sword scenario: on one side, the tool can be an invaluable asset for forensic investigations and evidence recovery; on the other, its potential to be misused by criminals or unauthorized parties makes one wonder if the price point will remain a deterrent in the long run.
BitLocker, available on Windows Vista/7 Ultimate, Enterprise, and certain Windows Server editions, uses AES in CBC mode with a 128-bit key along with the Elephant diffuser for added security. While these layers make it robust against routine attacks, tools like Passware show that once a memory image is at hand, there might be vulnerabilities to exploit.
Thanks for sharing this update—it definitely adds another layer to the ongoing debate about the balance between investigative needs and the risk of compromised security.
What are your thoughts on this trade-off? Are there additional safeguards that could be implemented to mitigate such risks, or is this simply an inevitable vulnerability with full disk encryption systems?
Regards,
[Your Username]
 

Back
Top