Header Banner
Null Byte Logo
Null Byte
wonderhowto.mark.png
Cyber Weapons Lab Forum Metasploit Basics Facebook Hacks Password Cracking Top Wi-Fi Adapters Wi-Fi Hacking Linux Basics Mr. Robot Hacks Hack Like a Pro Forensics Recon Social Engineering Networking Basics Antivirus Evasion Spy Tactics MitM Advice from a Hacker

Encryption Is Not Enough !, Research & Conclusion (Part 1)

Jan 2, 2016 08:19 AM
Jan 2, 2016 08:20 AM
Broken chain link with a question mark on a blue background.

Hello World ! Well, welcome in my post. This will be in series, and this is first part. Throughout the series, I will share my research and findings with you. And that will be on topic, Encryption Is Not Enough. We will see, how Encryption is broken & what countermeasures should be implemented to secure it.

Broken metal chain link on a blue background.

Let's begin, Why do we encrypt ?

-We encrypt, simply for privacy & secrecy

-We encrypt, in pro term : for Confidentiality & Integrity. Well, these are basics for encryption.

Now, how many of you use free/open source encryption software ? This is the time now, stop and think about your data & how you are securing it. Let me share the quote from TrueCrypt (assuming that you know about TrueCrypt), "TrueCrypt does not secure any data on a computer if an attacker has physical access to the computer before or while TrueCrypt is running on it" Ok then, why do we need such kind of encryption ?

Encryption options in TrueCrypt volume creation wizard.

Well now, below is a sort of FDE (Full Disk Encryption) Boot Process image of modern days CPU & I'll explain Boot Process, depending on this diagram.

FDE Boot Process Diagram illustrating the flow between components such as RAM, CPU, and user interaction.

Img Src : defcon-21-selifonov

So, here is the process :

  • Bootloader loads from secondary storage (SSD/HDD : Refer Image) on the computer by BIOS & it gets copied to main memory (RAM) via some sorts of so called data transfer.
  • Then bootloader seeks the authentication credentials (password, tokens, keys or something like that) from USER (Refer image to find user).
  • That password is then transferred to key, and is stored in RAM as long as system/computer is live/active.
  • Then, bootloader transfer control to OS and then both OS & key remains in memory for transparent encryption and decryption of computer.

Coolest part is here, who might alter this process ? or try to alter ? Well, if someone tries to interfere this process, then he/she is trying to break the encryption part of disk/system. And yes, this is possible and already broken.

A person tearing a paper with the word "TRUST" written on it.

Img Src : eleanorburns88.files wordpress site

There are different approaches to deal with this (basically in terms of breaking the encryption). Here, in this series i'll be talking about some sorts of scripts, when executed via flash drives will then alter the FDE Boot Process. This is simply a initial approach. If, it fails.....then ? Well, next thing is, we have to now play with disk/system physically. We must try to de-attach the disk, open it with screw, and modify some sorts of chips. Some of the process involved in breaking encryption are :

  • Compromised OS : In case, if victim is not using FDE. Here, admin or user gets tricked with some sort of exploits (assuming that you know about exploits), which then allows a attacker a kind of full control over systems file, logs, process & services. (other attacks will explained in next part)

Ok, world ! for now, this is it. Stay tuned for next part on this series. I have a lot to talk and share about.

You already know how to use your phone. With Gadget Hacks' newsletter, we'll show you how to master it. Each week, we explore features, hidden tools, and advanced settings that give you more control over iOS and Android than most users even know exists.

Sign up for Gadget Hacks Weekly and start unlocking your phone's full potential.

Related Articles

Comments

No Comments Exist

Be the first, drop a comment!