[sleuthkit-users] HD Passwords
Brought to you by:
carrier
|
From: J B <je...@ad...> - 2006-05-18 15:08:33
|
This is off topic, though it does pertain to forensic = recovery...sorry... I was about to post a question about the best reference on cracking ata = hd passwords; The best reference is google pointing to caches of = experts-exchange threads mentioning loads of possibilities, but only a = couple certainties. A company called vogon has a product; rumour has it = it's 30.000 pounds, $50,000? =20 http://www.vogon-forensic-hardware.co.uk/forensic-hardware/data-capture/p= assword-cracker-pod.htm And the spec for ata3. http://www.seagate.com/support/disc/manuals/ata/d1153r17.pdf Some suggested swapping the pcb from the disk with another similar. = Since the drive security info is stored on a certain "track description = area" cylinder rather than on the board (only), the board would just = read that cylinder and continue securing the drive, no?. Instead, I = would propose using a pre-ata3 board. I would guess that the problem is = that it may not understand the new language of the track description = area. Consequently, the solution to the problem lies in replacing the = pcb with a custom pcb which can control the heads and understands the = track description language of the (even proprietary) drive. I don't = pretend this is an original idea, but I would be interested in knowing = what I'm missing - In short, going back to programatic control of the = heads. Even if it's not fast, it would be faster and cheaper than the = electron microscope method and less invasive than any kind of custom = spindle/heads rig. From what I've seen, there are no chips 'after' the = ribon cable entering the housing. If you control the heads (and spindle = motor), do you not control the drive? BTW, any idea how these guys operate? =20 http://a-ff.com/products/rrs/ thanks. -JB |