Forum: Geek Forum Topic: Windows XP Encryption Problem started by: Rshias Posted by Rshias on Apr. 13 2002,06:11
Let's just say that you had previously encrypted part of your secondary hard disk using the WindowsXP NTFS encryption. Later, your primary drive is formatted without backing up the encryption keys for the secondary drive. Is there any way to recover the data without the keys?EDIT: If there's no easy way to do it, anyone want to take a shot at breaking the encryption codes, or giving some tips on how to go about it? Would really hate to lose these files. They're pretty important for the most part. /me kicks himself for forgetting to back up the recovery agents. Posted by liquid metal on Apr. 13 2002,16:41
i think it only uses 64 bit encryption. maybe 128. no higher than 128.just dl some password sniffers....or something...
Posted by editor on Apr. 13 2002,17:12
< look at this >
Posted by RadioActive on Apr. 13 2002,18:01
that article sounded more like shameless selfpromotion then anything
Posted by liquid metal on Apr. 15 2002,00:13
KB: that page has absolutely nothing to do w/ xp's built in encryption. Posted by ic0n0 on Apr. 15 2002,01:20
Posted by Neophyre on Apr. 15 2002,06:12
i had the exact same problem with my drive when i upgraded my system.seagate has a hard drive utility that makes drivers to see that hard drive. but yeah it has to be a seagate drive i think. www.seagate.com Posted by editor on Apr. 15 2002,06:39
RA, that's what I get for not reading enough of it!ack* Posted by just_dave on Apr. 15 2002,23:46
You know, I heard someone call in TechTV with the same problem not to long ago, and they said, that there is no chance in getting em back. But TechTV IS hardly ever right. I would download some password programs and set them loose on it ... I mean heck as of right now you can't get the data back, so whats the worst you could do to it right?-dave Posted by TonyDennis on Apr. 20 2002,19:20
Well, aside from possibly causing additional damage to the harddrive's software, you could accidently lose any chance that you have of obtaining the lost information. Proceed with caution.
Posted by Rshias on Apr. 21 2002,06:26
After several attempts at breaking the crypto, I finally managed to pin down a buddy that works as a security expert for Microsoft. He officially confirmed that it was a lost cause because of how the built in encryption works. Without backing up the system state prior to the format, or disk damage, you're screwed.Thanks for the help nonetheless. Posted by CNCJake on Apr. 25 2002,00:38
I have the feeling your never going to see those encrypted files ever again. I studied Windos EFS pretty hard when I got my MCSE, and this is the kind of case senario that EFS is was made for; to prevent anyone from trying to access the encrypted files from anywhere other than the computer that was used to encrypt them. I dont recall the ecryption strenght, I do however know its at least 56 bit. I dont care what anyone says, unless you have access to your friends 2000 node beowulf cluster, or if your some kind of savant that can break encrytion codes,.... you be fucked. I have seen some statistics for breaking encrytion keys using brute force and top of the line desktops, and they were measuring it with years. As to password sniffing, that wount work the keys are not stored in the encrypted files. It basicly works the same way as secure certificates. Maybe go look at prices for data recovery, you may have not compleatly wiped the encrption keys off your HD, in which case they may be salvaged. Sorry man, stupid mistakes happen to the best of us.
|