Encryption

Report 9 Downloads 33 Views
DIGITAL INVESTIGATIONS OF ANY KIND Advanced Decryption Techniques Rob Attoe Forensic Analysis

Incident Response

Litigation Support

Information Assurance

Workshop Objectives • What is encryption

• Challenges of large keyspaces • AccessData Decryption Methodology

What is Encryption ? • Cryptography: Private Communication • Origin Authenticity • Destination Authenticity • Integrity Authenticity

• Encryption: • Transformation of data into unreadable form • Decryption: • Reverse of Encryption

Types of Encryption • Password Protection • “Knock Knock, Who’s There?” • Easy to gain access to the data

• Data Encryption • Uses a Cryptographic System • Difficult but not impossible

Symmetric Key Encryption Also referred to as Single Key Encryption, Secret Key Encryption, or One Key Algorithms

Plaintext

File Encryption Key

Cipher Text

Cipher Text

SOFTWARE File Encryption Key

Plaintext

SOFTWARE

Asymmetric Key Encryption

Plaintext

Cipher Text Rob is the Recipient

Rob’s PUBLIC Key ‘1234’

Rob’s PRIVATE Key ‘98765’

Max is the Sender

Cipher Text

Plaintext

Basic Cryptographic System Password

FEK RC4

00

01

02

03

04

05

06

07

08

09

0A

0B

0C

0D

0E

0F

10

11

12

13

Bit Strength Classification Easy Moderate Difficult DNA !! &%@# !!!

20 30 32 33 40 50 56 60 70 80 90 100 110 120 128 160

1,048,576 1,073,741,824 4,294,967,296 8,589,934,592 1,099,511,627,776 1,125,899,906,842,620 72,057,594,037,927,900 1,152,921,504,606,850,000 1,180,591,620,717,410,000,000 1,208,925,819,614,630,000,000,000 1,237,940,039,285,380,000,000,000,000 1,267,650,600,228,230,000,000,000,000,000 1,298,074,214,633,710,000,000,000,000,000,000 1,329,227,995,784,920,000,000,000,000,000,000,000 340,282,366,920,938,000,000,000,000,000,000,000,000 1,461,501,637,330,900,000,000,000,000,000,000,000,000,000,000,000

Brute Force Challenges Password Search Calculation Spreadsheet Lower Alpha: Lower and Upper Alpha: Lower and Upper Alpha w/ #'s: Alpha w/ #'s and Puncuation:

26 52 62 96

Character in Domain Length of Password Size of Key Space

26 6 308,915,776

Keys Tested Per Second

256,000

Best Practices to Decrypt Data

• AccessData Decryption Methodology • • • • •

Using Wordlists Registry data Suspect Intelligence Rainbow Tables Entropy

Special Ops Online Resources

Wordlists

Rainbow Tables

Environment Artifacts

Passphrase Generator

Suspect Intel Web Artifacts

Password Recovery Toolkit

Distributed Network Attack Rainbow Tables

Windows Logon Password Recovery

• Windows stores the user PASSKEY in the SAM file • Double encrypted with SYSKEY

• Identifying the password to: • Break EFS encrypted files • Potentially decrypt IntelliForms data • Use to open other encrypted files

SAM Passkey - Special Ops

Export The Wordlist

Web Artifacts

Registry Data – PSSP – IE6 Decrypted Queries / Account Passwords, etc !!

Protected Storage and IE7 ~ IE9

• •

IE Version 7 and Vista no longer us the PSSP Protected Data Stored now in 2 Keys in NTUSER.DAT

-Storage 1 (auto-complete form data) -Storage 2 (passwords) •

Encryption Scheme Modified to Comply with Windows DPAPI -Data Protection Application Programming Interface



DPAPI

-Cryptographic system built into Windows since Win2K -Function of the user’s login password

Questions ? • What is encryption • Challenges of large keyspaces • AccessData Decryption

Methodology

LAB Time Rob Attoe [email protected]

Recommend Documents