Regardless of the user-password, KEK or DEK. After resetting the ATA password, we had complete access to the decrypted user data, as the SATA chip decrypted on-the-fly. We located the location of the ATA password and some (unknown) connection to the AES password in different SAs from the internal 2.5" SATA HDD. Nevertheless, this is not an off-the-self solution offered, so we worked our way through to the AES protection. If it’s a Smartware VCD, then if you install the firmware patch to hide the VCD, it should stay hidden for all devices the drive is. WD can’t force the school to install the Unlocker application on their computers. If the user does not supply a password, the user data is inaccessible when connecting directly to the SATA ports.įinally, we were able to bypass the ATA password with commercial tools. If the school PC’s won’t allow the Unlocker application to run, all you can do is remove the password from the drive. The bridge is therefore doing user authentication by setting an ATA password, once the user generates his password. The data access is restricted by a set ATA-password in the SATA-HDD. We tried to connect the SATA HDD directly over the PCB for accessing a raw sector, but did not succeed.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |