Are there encrypted hard drives that forensics cannot read?

I read in a comment that it would be possible to read a hard drive using an electron scanning microscope and thus bypass its encryption.

Is something like that possible? I mean, the data is actually encrypted. What's the point if I can read the data without understanding its purpose? It's not like you put some kind of lock in the beginning and then the data is written down normally. And something like that would only be possible with an outdated HDD. With SSDs, the storage blocks are electronic. How you get to them is a mystery to me.

Is there a bomb-proof encryption that even the NSA can crack?

(2 votes)
Loading...

Similar Posts

Subscribe
Notify of
12 Answers
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
Mark Berger
1 year ago

I have read in a KOmmentar it would be possible to read a hard disk using electron-ray_microscope and thus bypass its encryption.

That’s all bullshit. The reading of hard drives with such a microscope is theoretically feasible. Practically, no one would do that. 1 million euros and reading would take months. Then you need to reassemble the data and clean it up as sectors not only contain the data but also markers and ECC information.

Apart from this, HDDs store data in cylinders. Say you have to separate the individual traces of the individual gastric discs and then rearrange the data.

comment image

This is because switching between the heads is faster than a track change!

So no one is running the effort because we are talking about working hours of 6-digit costs per HDD…

There was once a prototype of such a machine. However, since defective heads can be replaced more simply and cheaper, this would be only an option for scratched or broken gastric discs. But then it is questionable whether you find the data you are looking for. Therefore, the device was a commercial flop because no laboratory wanted to buy it.

But even if the data were still encrypted and you would have to crack encryption.

Is there a bomb-proof encryption that can crack the NSA itself?

I use hashcat or passware in the lab to crack passwords. If the password is too good, I can’t go on.

The difference to larger laboratories is the available computing capacity. In the case of passwords, this means that for each additional location, cracking becomes harder by a factor of 80-100.

So if I want to crack a place more in the same time, I would have to buy 79-99 more at my RTX2060 or even less RTX 4090er, etc.

So I would have to increase my computing capacity by 80-100 times…

On the subject of backdoors for authorities I don’t want to speculate around here. However, you also have quite different problems than “just” the encryption of the plate once the NSA wants to your data and secrets – e.g.:

  • Listening to phones
  • Monitoring of communication via the Internet
  • hidden microphones and cameras
  • etc.

They can also quickly install devices into your keyboard to monitor your inputs: https://www.keelog.com/forensic-keylogger/

Similar devices are available for networks – e.g.: https://shop.hak5.org/products/packet-squirrel-mark-ii

Here are the built-in variants that you could get into a computer not sold freely like the Squirrel and I also did not find a picture. The Squirrel shows the principle very well and I already used such devices at Pentests. Even in companies, the thing has not been discovered for the Pentest over the entire two weeks…

What works great with this is the Keylog cable! It had already been subverted by some employees and then finally picked up the inputs by WLAN…

TropicalNights
1 year ago

yes there is, but have forgotten the name of the program and is already older but therefore not worse. It would take many years to decrypt it with immense computing capacity

heizfeld
1 year ago

Hello,

With encryption, you will naturally strive to prevent all external access, forensics or not, and this will also be impossible to achieve in a human life at 256Bit.

Disk Encryption | Windows 10 | Secure Device | IT Security | Email and Internet | Communication, Information, Media Center (KIM) (uni-konstanz.de)

LG

Harry

BananaBoss23
1 year ago

If the data is stored encoded on the hard drive, you can’t start anything without a key, whether you can read it.
AES-256 is considered to be a secure encryption standard, for which it takes centuries to crack the key. But can become uncertain when quantum computers work.

Hope that has helped;)

Mark Berger
1 year ago
Reply to  Waldmorti

Hackers crack your password – the most secure encryption does not use anything if your password is easy to crack. Here, for example, a list of passwords I extracted from zig different data leaks: https://sourceforge.net/projects/wordlist-collection/

Mark Berger
1 year ago

Right. But do you have MFA in encryption? What I wanted to do is that the safest combination does not help if you use Maxi123! as a password at the end.

naaman
1 year ago

On an FP, whether SSD or HDD, the data is available only in the form of 0 and 1, and not in, for people, readable form.

Mark Berger
1 year ago
Reply to  naaman

You just need some exercise. I look at many in Hex editors as a forensic. These calculate only from 8 zeros or A 2-digit alphanumeric representation for more compact display:

comment image

The documentation of the respective file format or file system next to it and you can decode everything by hand. So does a program make much faster.

For example, if you want to check if a program works correctly, you need to check by hand if it is true.

ewigsuzu
1 year ago

if it has been encrypted, there is always the possibility to decrypt it, it only depends on how good the one is sitting there.

What do you think of these techniques?

Military…