Violently crack BitLocker encryption for Vista and Windows 7

  

Passware is a software company that provides password recovery, decryption and computer forensics services. This week they updated their flagship application, Passware Kit Forensic, to support cracking Microsoft's BitLocker hard drive encryption. The Passware Kit Forensic version 9.5 can recover the encryption keys of the hard drive protected by the BitLocker function in just a few minutes. It scans the image file of the target computer's physical memory and then releases the encryption key for the given BitLocker encrypted disk. As a result, Passware has successfully made itself the owner of the first commercial software to crack BitLocker Drive Encryption.

Passware claims that full disk encryption is a major problem for investigators, and it helps police, law enforcement and private investigators bypass the BitLocker encryption of the target computer's hard drive (Vista or Windows7 system). That is to say: This is a commercial product, and now people can bypass BitLocker hard disk encryption for only $795. And its widespread use is only a matter of time, money is not the main thing. (This software version 9.0 was released earlier this year and has been pirated)

Passware Kit Forensic can recover passwords for various types of files and decrypt Microsoft Word and Excel files (up to office 2003). And you can reset the passwords of local and Windows domain administrators. It is a complete solution for discovering encrypted evidence, reporting all password-protected files on the target computer and using the fastest decryption and password recovery algorithms to increase access to those files. It also has a portable version that runs from a USB drive and can be used to discover encrypted files, add recovery files and website passwords without making any changes to the target machine.

As pointed out in the comments, this is not exactly the "crack of BitLocker". Like most similar digital forensics analysis software, Passware Kit Forensic needs to access image files of physical memory target computers before extracting all BitLocker disk encryption keys. If the thief forensics analyst or physical access to the running system, you can take advantage of the fact that the content in the computer's memory. Other drive encryption programs have similar problems.

Of course, this is not really a crack on BitLocker. Like most digital forensics analysis software, Passware Kit Forensic needs to access the image file of the target computer's physical memory before implementing the crack. If a forensic analyst has access to a running system, it is possible to take advantage of the contents of the computer's memory, and other drive encryption programs have similar problems.

Copyright © Windows knowledge All Rights Reserved