-
Notifications
You must be signed in to change notification settings - Fork 196
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Recovering the recovery-key once drive is decrypted with dislocker #294
Comments
ok, digged in hard and finally found a paper giving me the necessary information: In Section 5.0 the author states:
So next to a Recovery Key entry in Bitlocker Metadata, we should find a recovery key encrypted by the VMK, besides the normally used and needed VMK encrypted by the recovery key:
When I mount this drive with the recovery key, the material with the nonce When I then take this VMK and decrypt the material with the lower nonce as stated in [0], I get a proper decrypt (MAC match) and the following bytes result:
In Section 5.4 of [0] the conversion process of the human readable recovery key into the bitlocker needed byte stream is outlined, this conversion is already implemented by dislocker, as the decryption with the recovery key is already implemented. Doing this conversion with my test system recovery key yields to the following:
and looking at the bytes in the decrypted Stretch key above, we see, that the * marked bytes match the recovery key:
The steps involved to create the recovery key when knowing a protector yielding to a VMK are:
looking for someone who can code nicer C than I do sigh |
I am looking for a way to decrypt(?) the recovery key, if the drive can be decrypted? Microsoft can do this easily, I wonder how this could be done when having the FVEK.
It would be a very handy feature, as many other tools cannot use FVEK or VMK but only recovery passwords.
Any idea / hints are appreciated!
The text was updated successfully, but these errors were encountered: