Is it possible to boot DCS over network(pxe) ?
ok. good result. I'd recommend to backup original volume via "dd". https://sourceforge.net/p/dc5/tickets/5/
ok. good result. I'd recommend to backup original volume via "dd".
awesome Alex, i tried it on a newly created volume and it works, hope i find my original volume, scanning it now.`<dcsfv> </dcsfv> <searchtype>ops</searchtype> <medias> <media> <path>\.\PhysicalDrive1</path> <blocksize>512</blocksize> </media></medias> <begin>0</begin> <end></end> <operations> <operation> <action>Ranges</action> <regionminsize>256</regionminsize> <statlevels> <bits1>0</bits1> <bits0>0</bits0> <bitst>0</bitst> <entropy>91</entropy> <montecarlopi>85</montecarlopi> <markovchainlength>0</markovchainlength>...
rebuild. Main idea: image contains sectors, encrypted sectors high entropy, possible ops: login, decrypt, save.
I hope it will, thanks for everything. waiting for the update.
end of the week will try to update to the latest VC. note: dcsfv main goal to find volumes. files as VC container it might be not useful.
<DcsFV> <!-- Modes of search: Authorize, Regions --> <SearchType>ops</SearchType> <!-- List of media and sector ranges to scan Scenario in the example: Disk was double decrypted with wrong header => The following actions specified 1. encrypt the disk twice with "wrong" header to restore data 2. save data to new file 3. check statistics lavel for saved data 4. try real header decrypt --> <Medias> <Media> <Path>\\.\PhysicalDrive1</Path> <BlockSize>512</BlockSize> <!-- begin block (0 - by default) -->...
<DcsFV> <!-- Modes of search: Authorize, Regions --> <SearchType>ops</SearchType> <!-- List of media and sector ranges to scan Scenario in the example: Disk was double decrypted with wrong header => The following actions specified 1. encrypt the disk twice with "wrong" header to restore data 2. save data to new file 3. check statistics lavel for saved data 4. try real header decrypt --> <Medias> <Media> <Path>\\.\PhysicalDrive1</Path> <BlockSize>512</BlockSize> <!-- begin block (0 - by default) -->...
<DcsFV> <!-- Modes of search: Authorize, Regions --> <SearchType>ops</SearchType> <!-- List of media and sector ranges to scan Scenario in the example: Disk was double decrypted with wrong header => The following actions specified 1. encrypt the disk twice with "wrong" header to restore data 2. save data to new file 3. check statistics lavel for saved data 4. try real header decrypt --> <Medias> <Media> <Path>\\.\PhysicalDrive1</Path> <BlockSize>512</BlockSize> <!-- begin block (0 - by default) -->...
dcsfv tool scans entire disk or image. I'd recommend to backup disk to new image via "dd" tool. Then scan the image file. Scan, there are two modes - "slow" try to authorize. "fast" - check entropy of a sector. To rebuild unpack newer version of VC and dcsfv then build.
Also , do you think it will work with the new versions ? I tried DCS-2017_03_28 on a new container but it didnt find the header.
Thanks for replying Alex. Can you please give me an cfg example ? I tried everything. I can't figure out how to scan an drive for the header. :( thanks.
src attached. as is. to build vs2015
How do i use the authorize function in DcsFV 3 ?.
How do i use the searchtype function in DcsFV 3 ?.
,
.
the container is visible on the Drive. started... dcsfv.cfg ops \.\PhysicalDrive2 [0, 31457280] 5529600 [17.58%]R many attempts no luck. <DcsFV> <!-- Modes of search: Authorize, Regions --> <SearchType>ops</SearchType> <!-- List of media and sector ranges to scan Scenario in the example: Disk was double decrypted with wrong header => The following actions specified 1. encrypt the disk twice with "wrong" header to restore data 2. save data to new file 3. check statistics lavel for saved data 4. try...
So i did a test with an encrypted container , i moved it to and USB drive and started up Dcs tool , It cant find the header, i tried every possible configuration. I have tried DcsFV_03 and DCS-2017_03_28 with no luck. What i'm missing ? Anyone willing to help ? Thanks.
"Disk Cryptography Services offer robust security measures that are as reliable as the rigorous Degree Attestation for UAE. Protect your data with confidence!"
I've been looking into Disk Cryptography Services to secure my sensitive data, but I'm not sure where to start. Can anyone recommend a good software or service for this purpose?
"Disk Cryptography Services offer robust security measures that are as reliable as the rigorous Degree Attestation for UAE. Protect your data with confidence!"
No, it would not help with BIOS password. Maybe opening the computers case and temporarily removing the CMOS battery would. Solutions to that are not Linux-specific. It should be fairly easily to find guides on how to do that.
I forgot my BIOS password a long time ago and recently in the last few momths I noticed when shutting down my laptop i see a message about, failed to connect to TMP or something like that, I found out its a setting in Bios and I need to turn it on or even update Bios but I ncan't get in it now , would this help me reset my Bios password or get me past the it? I have a couple other things Im trying first first but I just thought I would ask while i was here. oh almost forgot, im running the latest...
I forgot my BIOS password a long time ago and recently in the last few momths I noticed when shutting down my laptop i see a message about, failed to connect to TMP or something like that, I found out its a setting in Bios and I need to turn it on or even update Bios but I ncan't get in it now , would this help me reset my Bios password or get me past the it? I have a couple other things Im trying first first but I just thought I would ask while i was here.
Hello, Thanks for developing it! It seems the repositories are empty? I have four questions regarding DcsFV: 1. If the password contains < or > how to input them while avoiding a config file error? Should they be HTML escaped as < > ? 2. The config says "hash name or ID". What are the hash names besides SHA-256? I mean I know the algorithms but maybe casing matters? Or what are the indexes of each method? 3. When TcMode is set to 1, is that how one also checks for Veracrypt headers? 4. What...
Hello, Thanks for developing it! It seems the repositories are empty? I have four questions regarding DcsFV: 1. If the password contains < or > how to input them while avoiding a config file error? Should they be HTML escaped as < > ? 2. The config says "hash name or ID". What are the hash names besides SHA-256? I mean I know the algorithms but maybe casing matters? Or what are the indexes of each method? 3. When TcMode is set to 1, is that how one also checks for Veracrypt headers? 4. What...
Hello, Thanks for developing it! It seems the repositories are empty? I have four questions regarding DcsFV: 1. If the password contains < or > how to input them while avoiding a config file error? Should they be HTML escaped as < > ? 2. The config says "hash name or ID". What are the hash names besides SHA-256? I mean I know the algorithms but maybe casing matters? Or what are the indexes of each method? 3. When TcMode is set to 1, is that how one also checks for Veracrypt headers? 4. What...
Hello, Thanks for developing it! It seems the repositories are empty? I have four questions regarding DcsFV: 1. If the password contains < or > how to input them while avoiding a config file error? Should they be HTML escaped as < > ? 2. The config says "hash name or ID". What are the hash names besides SHA-256? I mean I know the algorithms but maybe casing matters? Or what are the indexes of each method? 3. When TcMode is set to 1, is that how one also checks for Veracrypt headers? 4. What is Region...
Hello, Thanks for developing it! It seems the repositories are empty? I have four questions regarding DcsFV: 1. If the password contains < or > how to input them while avoiding a config file error? Should they be HTML escaped as < > ? 2. The config says "hash name or ID". What are the hash names besides SHA-256? I mean I know the algorithms but maybe casing matters? Or what are the indexes of each method? 3. When TcMode is set to 1, is that how one also checks for Veracrypt headers? 4. What is the...
I seem to be dealing with this same issue on a Dell Inspiron 5570-5521slv with Windows 10 Build 1803 installed on an SSD drive with secure boot disabled. ref: https://sourceforge.net/p/veracrypt/discussion/general/thread/3e9ec24696/ After removing the DcsInfo file from the VeraCrypt 1.21 install the system stopped rebooting endlessly and presented the expected password prompt.
Encryption test endless reboot loop until deleting DcsInfo on Dell Precision M4800
If it runs in UEFI mode, of course you can boot from efi shell. Create directory /EFI/Shell/ on VeraCrypt RescueDisk Put Shell.efi into this directory Plug in RescueDisk and boot laptop Press (probably) F2 to enter UEFI menu and move VeraCrypt Loader (EFI USB) to first position in boot order Let laptop boot from USB Press s and enter to start Shell.efi
Apparently I cant launch an efi shell on my 3k surfacebook. Its literally the best laptop ever, rip.
Copied from my other post Why is that not in the "guide"? Is it because the information is wrong? Is it because the names of partitions dont matter? So I skim on. Next step: Install windows to partition H_OS. Im thinking to myself, windows makes 4+ partitions during install, so now my drive is gonna have 8+ partitions. This will probabally break support for the guide. I dont see this working. Next step: Add Shell.efi to rescue disk. I am going to open it in 7zip and add the file like the .iso was...
I'm sorry, my guide didn't helped you. I really spend a lot of time to make it as understandable as possible. But I didn't understand your problem either: 1. Changing partition type to Recovery or ESP is detailed described - literally step by step. (Step 5.10.) 2. I don't think, it's a mentionable problem, how to change the name of a partition, since it isn't related to disk encryption. But of course you should NOT have to search for complicated informations - but actually there really is no need...
I'm sorry, my guide didn't helped you. I really spend a lot of time to make it as understandable as possible. But I didn't understand your problem either: 1. Changing partition type to Recovery or ESP is detailed described - literally step by step. (Step 5.10.) 2. I don't think, it's a mentionable problem, how to change the name of a partition, since it isn't related to disk encryption. But of course you should NOT have to search for complicated informations - but actually there really is no need...
I'm sorry, my guide didn't helped you. I really spend a lot of time to make it as understandable as possible. But I didn't understand your problem either: 1. Changing partition type to Recovery or ESP is detailed described - literally step by step. (Step 5.10.) 2. I don't think, it's a mentionable problem, how to change the name of a partition, since it isn't related to disk encryption. But of course you should NOT have to search for complicated informations - but actually there really is no need...
Copied from my other post / Well just got scammed by fellis :) I lost 20% of 0.03 btc; no docs. Read DJ Bonz "guide" and its literally unintelligable. I wish people would understand that I want to buy a guide. Not research a bunch of stuff. Not look at something, scrounge for more information on the internet. I want a guide. How is this so hard? DJ Bonez, this isn't your fault; just frusterated im out about 60-80 dollars to a scam artist. This isnt the first, seccond, or third time asking for a guide...
Step by step guide: Creating hidden OS in UEFI mode (v2.0)
The state of things is Alex needs funding for this project and he only has 3 possible sources of funding. 1- Users Unfortunatally no one has ever been able to install this software as intended as documentation is non existent. Alex is the smartest person in the world on UEFI, and he doesnt realise mortals (users) cant install or use his software. We are not as intelligent as you. We dont understand UEFI at all. The only thing I understand is when I look for a computer I look for BIOS support for...
First release of DCS
DcsFV for linux
DcsWinCfg for linux
HOS linix
DcsWinCfg for linux
mount volume to folder in Windows.
It is possible. You can use any small partition to create keys. EFI is more flexible. It is possible to boot any OS from boot selection or from loader. downloads page contains demo avi. Your configuration is possible. DELL precision - good hardware. I used the same some time ago (M6500) but it does have EFI.
Hi Alex et Al., Is it possible for DC5 / DCS to have hidden OS but without authorization USB? The idea is to be able just to have hidden OS or to be more eact just a second encrypted Windows OS. Reading through disk_encryption_v1_2.pdf it goes through procedure of creation of USB but I'm not sure if it is obligatory or optional? It is in context of: https://sourceforge.net/p/veracrypt/discussion/technical/thread/f90bcf05/ I've had similar setup with MBR based system, in fact it was even Macbook Pro...
I hope Mounir will return to project soon.
Ok I understand. Really sad to see that for the main developer. I hope it will be OK, VeraCrypt is very important, but obviously nobody forces you for logical reasons.
Probably most of modification will be included in 1.20 final release of VeraCrypt We've been working with Mounir. He had some personal issues for last half year. Future of VeraCrypt was not clear. This is the reason to start DCS project separately. Configuration procedure of two factors authentication is in disk_encryption_v1_2.pdf. There are several steps from EFI shell.
related to https://sourceforge.net/p/veracrypt/discussion/features/thread/fa975105/ For the USB key method, this is what I would like yes. But your project is not a real part of VeraCrypt if I am not mistaken. Why your project is not directly in VeraCrypt?
related to https://sourceforge.net/p/veracrypt/discussion/features/thread/fa975105/ For the USB key method, this is what I would like yes. But your project is not a real part of VeraCrypt if I am not mistaken. What about your relationship with the VeraCrypt team/author? Why your project is not directly in VeraCrypt?
Hello, Main idea – encryption has to be open source to trust. There are many closed source commercial competitors and more functional (TPM, smart cards etc). At first I wanted to make the tool for personal use only for my T732 but there was big interest to support EFI from community. So DCS was published. DCS was a separate project (not part of VeraCrypt). DCS could support OPAL, DiskCryptor, LUKS or other encryption tools as PBA. It is general PBA for EFI. I chose VeraCrypt because it looked like...
I started donation campaign to check interest of community. Unfortunately there is no activity. If your tool solves the issue we're currently discussing, I'll happily donate. Consider putting your tool on GitHub which will not only draw other developers to help you with the program, but also sky-rocket its "fan-base". Please especially think about accepting anonymous donations via PaySafeCard - because that will be the only way I will donate, buddy. Privacy-geeks like donating in private, ya know......
I started donation campaign to check interest of community. Unfortunately there is no activity. If your tool solves the issue we're currently discussing, I'll happily donate. Consider putting your tool on GitHub which will not only draw other developers to help you with the program, but also sky-rocket its "fan-base". Please especially think about accepting anonymous doantions via PaySafeCard - because that will be the only way I will donate, buddy. Privacy-geeks like donating in private, ya know......
I started donation campaign to check interest of community. Unfortunately there is no activity. If your tool solves the issue we're currently discussing, I'll happily donate. Consider putting your tool on GitHub which will not only draw other developers to help you with the program, bvut also sky-rocket its "fan-base". Please especially think about accepting anonymous doantions via PaySafeCard - because that will be the only way I will donate, buddy. Privacy-geeks like donating in private, ya know......
I started donation campaign to check interest of community. Unfortunately there is no activity. If your tool solves the issue we're currently discussing, I'll happily donate. Consider putting your tool on GitHub which will not only draw other developers to help you with the program, bvut also sky-rocket its "fan-base". Please especially think about accepting anonymous doantions via PaySafeCard - because that will be the only way I will doante, buddy. ;-)
Hello, Main idea – encryption has to be open source to trust. There are many closed source commercial competitors and more functional (TPM, smart cards etc). At first I wanted to make the tool for personal use only for my T732 but there was big interest to support EFI from community. So DCS was published. DCS was a separate project from the begging (not part of VeraCrypt). DCS could support OPAL, DiskCryptor, LUKS or other encryption tools as PBA. It is general PBA for EFI. I chose VeraCrypt because...
Hello Discovered your fork somewhat by chance... Would you elaborate as of what you want to achieve here ?
First release of DCS
mount volume to folder in Windows.
volume encrypted mount to folder in Windows.
First release of DCS
volume encrypted mount to folder in Windows.
First release of DCS
First release
First release
First release
First release
First release
First release
Make first release
Create release