How LEO cracks Truecrypt & Veracrypt + how to generate secure keys | The Diaries of Dr.Gonzo


So you think encryption is a magic bulllet, huh? You are wrong



Onion Details



Page Clicks: 1

First Seen: 05/07/2024

Last Indexed: 10/25/2024

Domain Index Total: 164



Onion Content



- So you think encryption is a magic bulllet, huh? You are wrong. Intro I have many years, decades in fact, of experience styding and breaking software, hardware and physics. Including their encryption schemes, and I’m essentially a pot head. While the mathematical theory behind these things are often solid as fuck, they are only as solid as their implementation and the user’s ability to use secure passphrases and keys, not to mention reliable entropy sources. The theories assume perfect practical implemenetation - this is almost never the case. I have cracked satellite-tv encryption, playstation encryption, android, Iphone, VPN, SSL/TLS, web app, smart card encryption (think chipped bank cards, access cards, so forth). I have made a living doing this, this is not to say it is easy; It is not. It requires hard work, study of advanced topics, including code, math and hardware. You rarely, if ever hear about me in the news unless I make it a point to go public, often under pseudonyms; I am not married to my handles, that’s just a stupid idea as it puts a target with a list of things to let the LEO fuck you over with your own laundrylist of shit done. I could go in to massive technical detail on this but I will try to KISS (Keep It Simple, Stupid). There is an indsutry around cracking into encrypted devices and such. Some key players include GrayShit, ElcomSoft,. Cellebrite and NSO. I was one of a couple of hackers who made sure GrayKey from GrayShift and the ElcomSoft clone stopped working after a couiple of months. Those cables cost 100 000 - 300 000 NOK pr unit depending on license. We made better ones for about 500 NOK ($40-ish) as we recognized this was the zombie of the FireWire problem come back to life as USB-C and made sure Apple got the message: “Fix this or else these are going on ebay”. We put them up for sale anyhow ;) I recommend you read the book about the truecrypt author: The Mastermind: Drugs. Empire. Murder. Betrayal. So how do LEO do this with TrueCrypt and Veracrypt? ElcomSoft, which has a long history profiting from depraving us citizens of our human need and right to secrecy, as well as privacy. These intagiable things are essential to human mental health, well-being and living. These companies I mentioned do business with regimes all over the world from Norway to Saudi Arabia and worse. As a Norwegian, shrug, I am ashamed of, amongst other things, this. ElcomSoft has ripped off a powerful encryption cracking software called “Hashcat” . Their only contribution to this making is distributable; That is they have made it able to work on one problem using many different servers working on their own chunk. The software in question is called: “Elcomsoft Forensic Disk Decryptor” So how do you make a secure passphrase? The key thing to understand after the whole thing about entropy etc, is to know how to make a secure passphrase. This starts with understanding what the maxmimum keylength for each encryption scheme is, so i will give some examples to clarify this, nevermind what the letters of intialism stands for; it’s not the important part: ​ AES-128: This means AES uses as 128bit key, any how shorter key will be padded with nulls (0), effectively making your key shorter and easier to crack. ​ AES-256: Exactly the same as above. So to calculate the maximum key length you simply divide the number by 8, as 8 bits is 1 byte and 1 byte =~ 1 character: ​ 128 bit / 8 = 16 bytes ​ 256 bit / 8 = 32 bytes A Single ASCII character is about 1 byte: a-z A-Z 0-9 !”#$%/()’>< and so on are each one byte. but originally called 7-bit ASCII. So to make a secure key for AES-128 (AES-128 is not to be considered super secure anymore): The following command generates a secure 128bit key: LC_CTYPE=C tr -dc A-Za-z0-9_\!\@\#\$\%\^\&\*\(\)-+= < /dev/urandom | head -c 16 | xargs Which results in someting resembling this: “AIk1HPbvH” This makes a secure 256 bit key: LC_CTYPE=C tr -dc A-Za-z0-9_\!\@\#\$\%\^\&\*\(\)-+= < /dev/urandom | head -c 32 | xargs Which results in something like this: “bKEgK3Kkr3vvah=$wLfP2jXu&^I(+(6i” This of course requires a proerply seeded entropy system, I will update this article later on that topic. The ElcomSoft suite LEO uses: Elcomsoft Forensic Disk Decryptor Description Elcomsoft Forensic Disk Decryptor offers all available methods for gaining access to information stored in encrypted BitLocker, FileVault 2, PGP, TrueCrypt and VeraCrypt disks and volumes. The toolkit allows using the volume’s plain-text password, escrow or recovery keys, as well as the binary keys extracted from the computer’s memory image or hibernation file. FileVault 2 recovery keys can be extracted from iCloud with Elcomsoft Phone Breaker, while BitLocker recovery keys are available in Active Directory or in the user’s Microsoft Account. Features VeraCrypt Encryption VeraCrypt is the most popular successor to open-source disk encryption tool TrueCrypt. Compared to the original, VeraCrypt supposes a wider range of encryption methods and hash algorithms. In this update, Elcomsoft Forensic Disk Decryptor receives full support for VeraCrypt volumes, enabling experts extracting hash data from VeraCrypt containers to launch brute-force or smart dictionary attacks with Distributed Password Recovery. Elcomsoft Forensic Disk Decryptor can automatically decrypt the entire content of the encrypted container, providing investigators with full, unrestricted access to all information stored on encrypted volumes In the real-time mode, Elcomsoft Forensic Disk Decryptor mounts the encrypted volume as a new drive letter on the investigator’s PC. In this mode, forensic specialists enjoy fast, real-time access to protected information. Information read from mounted disks and volumes is decrypted on-the-fly in real time. If neither the decryption key nor the recovery key is available, Elcomsoft Forensic Disk Decryptor will extract metadata necessary to brute-force the password with Elcomsoft Distributed Password Recovery. Elcomsoft Distributed Password Recovery can attack plain-text passwords protecting the encrypted containers with a range of advanced attacks including dictionary, mask and permutation attacks in addition to brute-force. Closing words Fsck you LEO, you have created a monster, Baba Yaga, dedicated to fsck you up by crushing your tools, advantages and ability used to violate us for permanetly fucking up my life with punishment when I needed help. And this part just my side-hobby I do for fun. Dr.Gonzo Be good or be good at it. Feb 7, 2021