Windows 7 Forums

Welcome to Windows 7 Forums. Our forum is dedicated to helping you find support and solutions for any problems regarding your Windows 7 PC be it Dell, HP, Acer, Asus or a custom build. We also provide an extensive Windows 7 tutorial section that covers a wide range of tips and tricks.


Windows 7: is bitlocker so easy to crack?

20 Aug 2013   #11
Lady Fitzgerald

Win 7 Ultimate 64 bit
 
 

From what I can tell, the USB stick supplies the key. I would suggest asking Shawn, the guy who wrote the tutorial.


My System SpecsSystem Spec
.
04 Dec 2013   #12
captain118

Windows 7 x64
 
 

Most of the motherboards I work with dont come with TPM chips. The only ones I see with them are Dell systems. I imagine HP systems have them too but I haven't seen them on any ASUS, or EVGA boards.
My System SpecsSystem Spec
04 Dec 2013   #13
Lady Fitzgerald

Win 7 Ultimate 64 bit
 
 

Quote   Quote: Originally Posted by captain118 View Post
Most of the motherboards I work with dont come with TPM chips. The only ones I see with them are Dell systems. I imagine HP systems have them too but I haven't seen them on any ASUS, or EVGA boards.
You aren't looking hard enough. Many, if not most, of the recent ASUS boards have a TPM port that one plugs a TPM card into. My ASUS P9X79 WS has a TPM port.
My System SpecsSystem Spec
.

04 Dec 2013   #14
logicearth

Windows 10 Pro (x64)
 
 

Just so you all know BitLocker and TrueCrypt use pretty much the same encryption, AES. If BitLocker's encryption is weak so is TrueCrypt. Now of course, BitLocker and TrueCrypt use a few more techniques other then just plain old AES those implementations differ, however at the base level both are relatively secure using AES. (At his time.)

Furthermore, all the attacks used against BitLocker can also be used against TrueCrypt. All encryption software is vulnerable to the same attacks.
My System SpecsSystem Spec
04 Dec 2013   #15
jimbo45

Linux CENTOS 7 / various Windows OS'es and servers
 
 

Hi there.

Often Bitlocker can be undone by simply booting a LINUX Live system from a USB stick and then reading the BIOS de-cryption key / recovery key / recovery key algorithm. Then you re-boot again into the BIOS and supply the recovery key or even the basic key.

"Seemples" as the Meerkat commercials say.

If you want 100% security -- REMOVE THE DEVICE - otherwise it's NOT POSSIBLE to get 100% protection by simple encryption where the decryption algorithm / key process has to be stored on the same machine -- at boot you don't necessarily have access to the internet so the key (or at least the decryption algorithm) needs to be stored locally - and while Windows might have protected data areas - Linux is another OS which will just see the Windows disks as pure DATA.

It's not quite Hacking 101 - not for beginners - but a reasonably experienced hacker could easily get hold of the recovery key in order to undo the Bit locker encryption.

The BIOS asks for the recovery key -- just DUMP the BIOS out and with a little bit a bit of "dis-assembly" and you are on your way. !! You'd soon see what the BIOS is asking for -- and then it's all over.

(To those people who think it's safe because the key / recovery key has to be supplied from an external device -- no good as the ALGORITHM to decrypt the wretched thing is still stored locally on the machine - hence the vulnerability).

Cheers
jimbo
My System SpecsSystem Spec
04 Dec 2013   #16
logicearth

Windows 10 Pro (x64)
 
 

Jimbo, you are going to have to back that up. As the encryption key does not reside within the BIOS. And, no it is not as simple as booting into a Live Linux CD.

As I also said previously, any attack against BitLocker can also be used against any other encryption software like TrueCrypt. To add to the fact all attacks require physical access, while most attacks require the OS to be running to start with.
My System SpecsSystem Spec
05 Dec 2013   #17
Alejandro85

Windows 7 Ultimate x64
 
 

Any encryption method is really as secure as its encryption key is. The actual algorithm don't matter that much really (as long as it's not too trivial to reverse), and in fact, security-wise you must assume that the attacker as full access to the whole system, including the algorithm and its implementation. The only thing you should really rely on is on the secrecy of the key, nothing more. With Bitlocker, the decryption algorithm is obviously stored within the computer, together with the data, that's OK, but you must make sure that the key (be it a password/pendrive/TPM module/whatever) is stored AWAY from that, otherwise you just have "security though obscurity", which is not real security. This is exactly what states the Kerckhoffs's principle.

Now, another thing to note is that all full-disk encryptions are only useful before the computer has booted, before that, remote access is very limited, if possible at all, so physical access is the only way to try to break it. But another problem is that it's often considered that when an attacker can get physical access to the data he's trying to get, it's already game over, and the attacker won. He then must crack the encryption key, which may or may not be trivial, but some techniques may optimize that (dictionary attacks, selectively trying most likely passwords or just brute force if time allows).

The AES algorithm is right now considered quite solid and reliable, so both Bitlocker and TrueCrypt are not that trivial to hack, but only when used with strong passwords. Ultimately, encrypted data can ALWAYS be reversed into its original form, if the attacker knows and really wants to do so.
My System SpecsSystem Spec
Reply

 is bitlocker so easy to crack?




Thread Tools Search this Thread
Search this Thread:

Advanced Search




Similar help and support threads
Thread Forum
BitLocker Drive Encryption - BitLocker To Go - Turn On or Off
How to Turn Windows 7 BitLocker To Go On or Off for Removable Drives BitLocker To Go is used to encrypt and password protect any removable external hard drives and USB flash drives. The drives must be formatted using either the exFAT, FAT16, FAT32, or NTFS file system and must be at least...
Tutorials
BIOS flash error, BITLOCKER on? No bitlocker installed, Win 7 Pro
I tried using HP BIOS Flashing utility on my HP Z400 Workstation, and it says it can't continue because I have Bitlocker enabled, but I don't have bitlocker on Win 7 Professional 32bit. I don't see it on the control panel or in context menus. I do see it set to manual in "Services" but the service...
General Discussion


Our Sites

Site Links

About Us

Find Us

Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd

All times are GMT -5. The time now is 21:43.

Twitter Facebook Google+



Windows 7 Forums

Seven Forums Android App Seven Forums IOS App