PRTK Dna User Guide
PRTK Dna User Guide
PRTK Dna User Guide
LEGAL INFORMATION
AccessData Corp. makes no representations or warranties with respect to the contents or use of this documentation, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, AccessData Corp. reserves the right to revise this publication and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. Further, AccessData Corp. makes no representations or warranties with respect to any software, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, AccessData Corp. reserves the right to make changes to any and all parts of AccessData software, at any time, without any obligation to notify any person or entity of such changes. You may not export or re-export this product in violation of any applicable laws or regulations including, without limitation, U.S. export regulations or the laws of the country in which you reside. 2010 AccessData Corp. All rights reserved. No part of this publication may be reproduced, photocopied, stored on a retrieval system, or transmitted without the express written consent of the publisher. AccessData Corp. 384 South 400 West Suite 200 Lindon, Utah 84042 U.S.A. www.accessdata.com
ACCESSDATA TRADEMARKS
AccessData is a registered trademark of AccessData Corp. Distributed Network Attack is a registered trademark of AccessData Corp. DNA is a registered trademark of AccessData Corp. Forensic Toolkit is a registered trademark of AccessData Corp. FTK is a registered trademark of AccessData Corp. Password Recovery Toolkit is a registered trademark of AccessData Corp. PRTK is a registered trademark of AccessData Corp. Registry Viewer is a registered trademark of AccessData Corp.
DOCUMENTATION CONVENTIONS
In AccessData documentation, a number of text variations are used to indicate meanings or actions. For example, a greater-than symbol (>) is used to separate actions within a step. Where an entry must be typed in using the keyboard, the variable data is set apart using [variable_data] format. Steps that required the user to click on a button or icon are indicated by italics. A trademark symbol (, , etc.) denotes an AccessData trademark. Unless otherwise notated, all third-party product names are spelled and capitalized the same way the owner spells and capitalizes its product name. Third-party trademarks and copyrights are the property of the trademark and copyright holders. AccessData claims no responsibility for the function or performance of third-party products.
REGISTRATION
The AccessData product registration is done at AccessData after a purchase is made, and before the product is shipped. The licenses are bound to either a USB security device, or a Virtual CmStick, according to your purchased.
SUBSCRIPTIONS
AccessData provides a one-year licensing subscription with all new product purchases. The subscription allows you to download and install the latest releases for your licensed products during the active license period. Following the initial licensing period, a
ii
subscription renewal is required annually for updating your products. You can renew your subscriptions through your AccessData Sales Representative. Use LicenseManager to view your current registration information, to check for product updates and to download the latest product versions, where they are available for download. You can also visit our web site, www.accessdata.com anytime to find the latest releases of our products. For more information, see ManagingLicenses in your product manual or on the AccessData web site.
General Corporate Hours: State and Local Law Enforcement Sales: Federal Sales:
Corporate Sales:
Accounting:
iii
TABLE Front-1 AD Mailing Address, Hours, and Department Phone Numbers Training: Voice: 801.377.5410, option 6 Fax: 801.765.4370 Email: Training@AccessData.com
TECHNICAL SUPPORT
You can contact AccessData Customer and Technical Support in the following ways:
TABLE Front-2 AD Customer & Technical Support Contact Information Customer Service Hours: Customer/Technical Support: Free technical support is available on all AccessData products. Monday through Friday, 7:00 AM 6:00 PM (MST) Voice: 801.377.5410, option 5 Voice: 800.658.5199 (Toll-free North America) Email: Support@AccessData.com Web site: http://www.AccessData.com/Support
The Support web site allows access to Discussion Forums, Downloads, Previous Releases, our Knowledgebase, a way to submit and track your trouble tickets, and in-depth contact information.
Note: All support inquiries are typically answered within one business day. If there is an urgent need for support, contact AccessData by phone during normal business hours.
DOCUMENTATION
Please email us regarding any typos, inaccuracies, or other problems you find with the documentation to: documentation@accessdata.com
PROFESSIONAL SERVICES
The AccessData Professional Services staff comes with a varied and extensive background in digital investigations including law enforcement, counter-intelligence, and corporate security. Their collective experience in working with both government and commercial entities, as well as in providing expert testimony, enables them to provide a full range of computer forensic and eDiscovery services. At this time, Professional Services provides support for sales, installation, training, and utilization of FTK, Enterprise, eDiscovery, Lab, and Lab Lite. They can help you resolve any questions or problems you may have regarding these products.
iv
vi
Table of Contents
AccessData PRTK 6.5 & DNA 3.5 User Guide......................................................................i Legal Information............................................................................................................i AccessData Trademarks...................................................................................ii Documentation Conventions............................................................................................ii Registration ....................................................................................................................ii Subscriptions.....................................................................................................ii AccessData Contact Information ...................................................................................iii Mailing Address and General Phone Numbers................................................iii Technical Support ............................................................................................ iv Documentation................................................................................................. iv Professional Services....................................................................................................... iv Contact Information for Professional Services..................................................... v Table of Contents ....................................................................................................................... vii Chapter 1 Overview ....................................................................................................................1 PRTK and DNA Overview...........................................................................................1 Features Overview.............................................................................................2 Other AccessData Decryption Products ..........................................................................3 PRTK / DNA Add-Ons ...............................................................................3 License Management Products...........................................................................5 Audience ........................................................................................................................5
Table of Contents
vii
Chapter 2 Installing PRTK 6.5 & DNA 3.5...........................................................................7 Before Installing PRTK or DNA...................................................................................7 Planning the Installation ...................................................................................7 PRTK or DNA Installation Prerequisites........................................................8 Installing PRTK.............................................................................................................9 Installing LicenseManager.............................................................................. 12 Installing DNA.......................................................................................................... 12 Supervisor Installation ................................................................................... 13 DNA Worker Installation ............................................................................ 16 After Installing PRTK or DNA................................................................... 26 Uninstalling PRTK or DNA ..................................................................................... 26 Uninstalling PRTK ....................................................................................... 26 Uninstalling the DNA Supervisor................................................................. 27 Uninstalling the DNA Worker..................................................................... 28 To Uninstall a Linux, Mac, or PS3 Worker................................................. 29 Chapter 3 Getting Started........................................................................................................ 31 Starting PRTK or DNA............................................................................................ 31 Using the USB Security Device ................................................................................... 32 Running PRTK or DNA in Demo Mode................................................................... 32 Right-click Menus ....................................................................................................... 33 Viewing Module Information....................................................................................... 33 Customizing the User Interface .................................................................................... 33 Showing or Hiding Elements.......................................................................... 33 The Menu Bar ............................................................................................................ 35 Changing Preferences...................................................................................... 39 The Toolbar................................................................................................................. 44 The Job Queue Pane .................................................................................................... 45 Changing Attributes Order in the Job Queue Pane ......................................... 47 Sizing Column Headings in the Job Queue Pane ............................................ 47 The Properties Pane..................................................................................................... 48 DNA User Interface................................................................................................... 49
viii AccessData PRTK 6.5 & DNA 3.5 User Guide
Priority Groups Pane ..................................................................................... 49 Chapter 4 Managing DNA 3.5 System Configurations ........................................................... 51 Disconnecting From and Connecting to the DNA Service............................... 52 Stopping and Restarting the Supervisor Service............................................... 52 Restarting the Worker.................................................................................... 53 Backing Up and Restoring Keys................................................................................... 54 Backing Up Keys........................................................................................... 54 Restoring Keys................................................................................................ 55 Viewing Workers Information From the Supervisor Machine ......................... 55 Viewing Worker Information From the Worker Machine............................... 56 Understanding the DNA Worker Interface................................................... 57 Managing Workers and Groups .................................................................................. 58 Filtering the Workers List ............................................................................. 58 Monitoring a DNA Worker ......................................................................... 60 Creating a Group .......................................................................................... 65 Editing a Group............................................................................................ 66 Deleting a Group........................................................................................... 68 Changing the Group Membership of a DNA Worker.................................... 68 Changing the Supervisor of a DNA Worker.................................................. 70 Chapter 5 Recovering Passwords............................................................................................... 71 Recovery Process Overview ........................................................................................... 71 Best Practices for Adding Jobs...................................................................................... 73 Adding Jobs ................................................................................................................ 74 Selecting Files ................................................................................................ 74 Dragging and Dropping Files ........................................................................ 75 Monitoring Jobs ........................................................................................................... 75 Managing the Recovery Process....................................................................... 76 Specifying Recovery Preferences ....................................................................... 77 Displaying Job Properties ............................................................................... 77 Printing Recovery Reports .............................................................................. 86
Table of Contents
ix
Managing Jobs in DNA ............................................................................................. 87 Allocating Resources for a Job ........................................................................ 87 Opening Files Using Recovered Passwords and Keys..................................................... 90 Manually Decrypting Files with a Password or Key ........................................ 90 Chapter 6 Managing Profiles ................................................................................................... 95 Default Profiles ........................................................................................................... 95 Setting a Default Profile................................................................................. 96 Creating a Profile .......................................................................................... 97 Editing a Profile ............................................................................................ 99 Deleting a Profile ......................................................................................... 100 Chapter 7 Managing Password Recovery Rules....................................................................... 101 Understanding Rule Categories .................................................................................. 101 Default Rule Order...................................................................................... 102 Modifying the Password Rule Order ............................................................. 102 Understanding a User-defined Rule.............................................................. 105 Creating a User-defined Rule ....................................................................... 111 Editing a User-defined Rule......................................................................... 113 Removing a User-defined Rule...................................................................... 113 Chapter 8 Using the Dictionary Utility.................................................................................. 115 Dictionary Basics....................................................................................................... 115 PRTK & DNA Dictionary Utility ......................................................................... 116 Starting the Dictionary Utility ..................................................................... 116 Browse Dictionaries ..................................................................................... 117 Dictionary Information ................................................................................ 118 Standard Dictionary Generator.................................................................... 118 Biographical Dictionary ............................................................................... 120 Merge Golden Dictionaries........................................................................... 128
Chapter 9 Specialized Password Recoveries ............................................................................. 129 Recovering Login Passwords ....................................................................................... 129 Accessing the SAM File and the System file................................................. 129 Recovering Login Passwords from Windows NT .......................................... 130 Recovering Passwords from Win 9x Files..................................................... 132 Recovering Login Passwords on Windows 2000 and XP Systems................. 133 Recovering Passwords Using a Boot Disk to Access the Files........................ 133 Processing the Protected System Files in PRTK or DNA............................. 134 Recovering Passwords from the Windows Registry ...................................................... 135 Recovering Passwords from the Current Registry........................................... 136 Recovering AOL Communicator Account Passwords.................................... 137 Recovering AOL Instant Messenger Passwords ............................................ 138 Recovering AOL Sign-on Passwords ............................................................ 138 Recovering MSN Messenger Login Passwords .............................................. 138 Recovering Netscape .W and .S Files ........................................................... 140 Recovering QuickBooks Passwords ............................................................... 140 Recovering Yahoo! Messenger Login Passwords ............................................. 140 Recovering WinZip Archive Files ................................................................ 141 Recovering IE7 ProtectedRegistry (Intelliforms) Files ................................................. 141 Collecting Necessary IE7 Files .................................................................... 142 Steps to Complete......................................................................................... 143 Component Details ...................................................................................... 144 Chapter 10 Managing Security Devices and Licenses.............................................................. 147 NLS Support ........................................................................................................... 147 Virtual CmStick ...................................................................................................... 147 Installing and Managing Security Devices .................................................................. 147 Installing the Security Device........................................................................ 148 Installing LicenseManager ......................................................................................... 156 Managing Licenses with LicenseManager................................................................... 158 Starting LicenseManager ............................................................................. 160 The LicenseManager Interface ...................................................................... 162
Table of Contents
xi
Opening and Saving Dongle Packet Files ................................................................... 166 Adding and Removing Product Licenses..................................................................... 167 Adding and Removing Product Licenses Remotely ........................................ 168 Updating Products ....................................................................................... 171 Chapter 11 Troubleshooting .................................................................................................... 173 PRTK and DNA Troubleshooting............................................................................ 173 Installation .................................................................................................. 174 Password Recovery ....................................................................................... 175 DNA Troubleshooting .............................................................................................. 176 Add Job Processing Results .......................................................................... 178 Appendix A Recognized Applications and File Formats........................................................ 179 Decryption Attack .................................................................................................... 179 Dictionary Attack..................................................................................................... 182 Keyspace Attacks....................................................................................................... 186 Reset Attacks............................................................................................................ 187 Multiple Attacks....................................................................................................... 187 Appendix B Password Recovery Attacks ............................................................................... 193 Languages ................................................................................................................. 193 Character Groups...................................................................................................... 193 Default Dictionaries .................................................................................................. 194 Rules......................................................................................................................... 196 Default Rule Order...................................................................................... 197 Profiles ...................................................................................................................... 202 English........................................................................................................ 202 Arabic......................................................................................................... 204 European .................................................................................................... 207 Russian ....................................................................................................... 209 Pass-phrase .................................................................................................. 211
xii
FTK Import ................................................................................................ 212 PRTK ......................................................................................................... 212 DNA ......................................................................................................... 214 Character Replacements ............................................................................................. 215 Common Prefixes ...................................................................................................... 215 Common Suffixes (a.k.a. Postfixes)........................................................................... 216 Prepositional and Verb Phrases ................................................................................. 216 Appendix C Encryption Technology....................................................................................... 217 Understanding Encrypted Files.................................................................................. 217 Understanding the PRTK & DNA Decryption Process ........................................... 218 Decryption Attack....................................................................................... 219 Dictionary Attack ....................................................................................... 219 Keyspace Attack .......................................................................................... 220 Reset Attack ............................................................................................... 220 Current Encryption Standards .................................................................................. 220 Symmetric Encryption.................................................................................. 220 RC4............................................................................................................ 221 Asymmetric Encryption ............................................................................... 221 Hashing .................................................................................................................... 222 Secure Hash Algorithm (SHA) .................................................................. 222 Message Digest 5 (MD5) ............................................................................ 222 Appendix D Program Files ................................................................................................... 223 PRTK Files .............................................................................................................. 223 DNA Supervisor Files.............................................................................................. 225 Appendix E Recovering EFS Files ....................................................................................... 229 Recovering EFS on Windows XP Service Pack 1 or Later........................................ 229 Other Notes .............................................................................................................. 230 AccessData Glossary .............................................................................................................. 231
Table of Contents
xiii
xiv
Chapter 1 Overview
This AccessData product manual covers both Password Recovery Toolkit(PRTK) 6.5 and Distributed Network Attack (DNA) 3.5. Both are used in many different environments to provide specific, password-cracking related functions. For example, law enforcement and corporate security professionals can use PRTK and DNA in computer forensic investigations to access password-protected files. IT administrators can use PRTK and DNA to recover system passwords, while individual users can use PRTK and DNA to recover lost passwords to personal files. These two products provide access to passwords for many popular applications in the industry.
PRTK runs on a single machine only. DNA uses multiple machines across the network
or across the world to conduct key space and dictionary attacks. In many cases, this makes use of time those computers would normally be idle, saving the cost of additional hardware. Many times, the cost of additional hardware is justified for a secure, dedicated password recovery lab. These and other differences are covered in this manual. In general when referring to PRTK features, you can assume that the same applies to DNA. The PRTK user interface is slightly different from that of DNA, so for those differences, you will need to refer to the DNA-specific sections of this manual for information regarding DNA-only features. For more information about PRTK, DNA, or any other AccessData product, see the AccessData website at www.accessdata.com.
work essentially the same way. Both programs analyzes file signatures to find encryption types and determine which recovery modules to use. See Understanding Encrypted Files on page 217.
Chapter 1 Overview
Before recovering passwords for protected files, PRTK and DNA create hash values that can be used to aid in determining whether the content of a file changed during the password recovery.
PRTK and DNA perform recoveries on protected files using various methods, including decryption and dictionary attacks. For more information on attack types, see Understanding the PRTK & DNA Decryption Process on page 218. For difficult password key values, PRTK performs dictionary attacks using various types of dictionaries, including the Golden Dictionary (containing previously recovered passwords), as well as Biographical, Custom User, and Default dictionaries. PRTK and DNA display basic file, or job, information for jobs in the Properties Pane,
and more extensive information in the Job Properties window. After recovering passwords, you can print reports, and open recovered files.
FEATURES OVERVIEW
PRTK and DNA perform the following basic functions:
Hash files
Hashing a file uses an algorithm that creates a unique hash value for a file, allowing verification that the contents of a file remain unchanged. When a file is added to PRTK or DNA for key or password recovery, it is hashed. When the key or password is recovered, the file is automatically hashed again to verify that the file itself has remained unchanged. This is particularly helpful to law enforcement personnel who need to verify that a file has not been changed while recovering a password.
Recover passwords
PRTK can recover the password to files created in many popular industry applications by using a variety of methods, including several types of dictionaries used within profiles, in combination with rules to achieve the desired results. PRTK can also recover multi-lingual passwords.
Generate reports
You can now print job information reports for password recovery jobs in .PDF format.
You can use recovered keys or passwords to open recovered files, if the applications the files originated from are available and installed on a computer you have access to. Recovered files can be copied or moved to any location.
Chapter 1 Overview
AccessData RainbowTables hash sets for Windows LAN Hash ship with their own user-interface program, and that is the one that should be used for LAN Hash files. The Rainbow Tables has sets for MS Office and Acrobat PDF, as well as the Portable Office Rainbow Tables, (PORT) all run with AccessData Rainbow Tables stand-alone userinterface program. Check for the latest version of RainbowTables.exe on the AccessData Website, www.AccessData.com.
One table available: MS Word & Excel (MS Office) 98.6% accuracy for MS Office Word and Excel files. Completely portable, fits on your laptop
PORT for Word and Excel takes only about 3.7 GB of disc space. It is shipped on a single DVD. You can carry it with you! Indispensable for on-site acquisitions and
investigations.
TACC UNIT
The Tableau TACC1441 Hardware Accelerator (TACC) is a specialized product that reduces the dictionary-based password recovery times of PRTK and DNA. The TACC accelerator performs massively parallel, high-speed computations of cipher-keys, yielding a dramatic increase in the number of passwords per second that each host computer generates. This results in a greater number of successful attacks in a
significantly shorter amount of time. For more information, contact your AccessData sales rep, or contact Tableau, LLC; www.tableau.com.
CODEMETER RUNTIME
The CodeMeter Runtime Kit is a program that is designed to work with the Wibu CodeMeter USB or Virtual CmStick so AccessData programs can verify license information stored on the CmStick. It must be installed prior to connecting the CmStick. The CmStick and CodeMeter Runtime Kit software must be fully installed prior to running LicenseManager. Either a CmStick, or a Keylok dongle with a current license is required to fully utilize PRTK or DNA. CodeMeter Runtime can be installed and running on the same machine with the AccessData Dongle Drivers, but both hardware devices cannot be connected to the same machine at the same time. For more information regarding the WIBU-SYSTEMS products utilized by AccessData, see Chapter 10 Managing Security Devices and Licenses on page 147.
AUDIENCE
PRTK and DNA are intended for law enforcement officials and corporate security and
assessment tool to identify the weakest links in an organization's security profile. Anyone using PRTK should possess the following competencies:
Chapter 1 Overview
Understanding of file protection through passwords and cryptographic standards Familiarity with the Microsoft Windows environment
In addition, law enforcement and corporate security professionals should possess the following competencies:
Basic knowledge of and training in forensic policies and procedures Familiarity with the fundamentals of collecting digital evidence and ensuring the legal
validity of the evidence
Understanding of forensic images and how to acquire forensically sound images Experience with case studies and reports
This chapter describes how to install and uninstall AccessData Password Recovery Toolkit (PRTK) and AccessData Distributed Network Attack (DNA).
Access policy
To prevent security issues, identify where the system is located, when the cases can be worked on, and ensure that only the desired personnel can access the system and its information.
the installation disc, beginning with this release, and is also available in the DNA 3 or PRTK 6 folder structure after installation.
Application relationships
Verify that your installed applications can work simultaneously. Also, do not run so many applications that you compromise overall performance.
You cannot install both PRTK and the DNA Supervisor on the same machine. You
must install one or the other.
Administrator rights
To run PRTK or DNA successfully, you must be logged in as an administrator with full admin rights on the local machine where PRTK or DNA is installed.
The WIBU-SYSTEMS 32- or 64-bit CodeMeter Runtime software with a WIBUSYSTEMS CodeMeter (CmStick) OR
If you will be using Rainbow Tables or PORT, you must have the WIBU-SYSTEMS
32- or 64-bitCodeMeter Runtime software, and the AccessData 32- or 64-bit Dongle Drivers with a Keylok dongle
INSTALLING PRTK
To install PRTK from the CD, do the following:
1. Insert the CD into the CD-ROM drive and wait for the PRTK 6 Installation screen to
display. If auto-run is not enabled, select Start > Run. Browse to the CD-ROM drive and select Autorun.exe.
10
If you choose not to accept the terms of the license agreement, you cannot
continue with the installation.
You can print the License Agreement by clicking Print. You must have a printer
already installed to do so. The product installation begins. A progress bar shows the status of the installation.
5. When the installation is complete, you will see the following screen.
6. Mark Run Password Recovery Toolkit if you want to run the program now. OR
11
Unmark Run Password Recovery Toolkit if you want to run the program later. Make your decision based in part on the following information:
If you have installed the dongle and the dongle drivers, check Run Password Recovery
Toolkit to run PRTK after completing the installation.
If you have not installed the security device and drivers, uncheck Run Password
Recovery Toolkit, then install the security device and drivers before attempting to run PRTK. Until you complete the process of installing the license security device, you will be able to run the product only in demo mode. For more information on this process, see Installing and Managing Security Devices on page 147. If you have to install the license security device drivers before you run PRTK, you can start PRTK later by selecting Start > Programs > AccessData > PRTK 6 > PRTK, or by clicking on the PRTK desktop icon.
7. Click Finish, return to the home page of the Autorun.exe, and then click
INSTALLING LICENSEMANAGER
LicenseManager lets you manage product and license subscriptions using a security device or device packet file. For installation instructions and more information, see Chapter 10 Managing Security Devices and Licenses on page 147.
Note: You can install LicenseManager from the PRTK or DNA installation disc, or from
INSTALLING DNA
You can install DNA from a CD or from downloadable files available on the AccessData web site, www.accessdata.com. You need to install CodeMeter Runtime, plus a dongle driver if using a green Keylok dongle instead of the newer WIBU-SYSTEMS USB or Virtual CmStick, the DNA Supervisor, and the DNA Worker(s).
12
Dongle Driver and/or CodeMeter Runtime: The Keylok dongle or the CmStick
enables you to use all features and recovery modules of DNA; the security device software must be installed on the supervisor machine. The CmStick requires only the CodeMeter Runtime software. The Keylok dongle requires The CodeMeter Runtime software and the appropriate Dongle Driver software. Both are available on the AccessData web site.
DNA Supervisor: A machine in the DNA system that controls worker machines in
the DNA system, and the jobs that they process. You must install the DNA Supervisor before you install the DNA Workers.
DNA Worker: You must run the appropriate DNA Worker installation program on
each participating machine in the system. The installation copies the files to the [drive]:\ProgramFiles\AccessData\DNA3\ directory, creates the Supervisor folder there, and places files necessary for installing workers, as well as other files there. Additional files are placed in [drive]:\DocumentsandSettings\AllUsers\ApplicationData\AccessData\PR This is where you will find Dictionaries, Rules, Profiles, and so forth.
SUPERVISOR INSTALLATION
Run the supervisor installation on the machine that you want to be a DNA Supervisor. Complete the supervisor installation before installing the DNA Worker on any machine.
1. Turn off all firewalls, virus scanners, and spyware. 2. Insert the CD into the CD-ROM drive.
If auto-run is not enabled, select Start > Run. Browse to the CD-ROM drive. In the Setup folder, double-click Autorun.exe.
13
If you are installing from downloadable files, double-click installer file that was downloaded from the AccessData web site.
14
If you choose not to accept the terms of the license agreement, you cannot continue with the installation.
5. Click Print to print the license agreement. You must have already installed a printer. 6. (Conditional) If you have already completed a partial uninstall and want to re-install
the supervisor using your saved keys, when prompted, click Yes; then browse to and select the Supervisor.inifile.
7. If you are updating from an earlier version, click Yes to view the update instructions,
15
7a. If you are updating from an earlier version, choose to view the Readme when
prompted.
8. Check Start the DNA Supervisor Service. Do not mark Run the DNA User Interface at this
time. You will need to install the worker(s) before running the DNA User Interface.
9. Click Finish to complete the installation on the Supervisor Installation Complete
form.
10. Follow the steps to install workers for your DNA system as described below.
16
If the directory isnt already shared, complete the following: In Windows Explorer, navigate to the[drive]:ProgramFiles\AccessData\DNA3\ directory. Right-click the\Supervisor\ directory and select Sharing.
1. In the Sharing tab, select Shared As. 2. (Optional) Enter any additional information in the Sharing tab fields that you want
to require of the client workstations before they can access the directory.
For 64-bit syterms: AccessDataDNAWorker(64bit).msi To install the worker on a Windows workstation, do the following: New workers update via Group Policy when the worker machine is rebooted. If you do not use Windows Server 2003, or do not implement Group Policies, do the following to install your workers:
1. On the Windows workstation, browse to the shared Supervisor directory and do one
of the following:
Double-click the correct *.msi file on the Supervisor machine, file as explained
above
Copy the correct *.msifile to the local worker machine, and execute it there. Right click on the correct *.msi file and choose Install.
17
Push the worker out to the worker computers using a third party product such as
a Windows Server Group Policy. Figure 2-1 Location of the WorkerInstall.msi File
3. Click Yes to accept the license agreement, then click Next. 4. If using Windows Vista, approve the installation. 5. Click Next on the Supervisor Information screen.
18
Important: Do not change any of the values, unless you want to connect this worker to a different supervisor.
6. On the Ready to Install screen, click Install to proceed with the worker installation. 7. Click Next on the screens as they appear, after reading their content. 8. When the installation is complete, Click Finish to finalize and close the worker
installation wizard. After the installation is completed the worker service runs and connects to the Supervisor. When you execute the Worker.exe file found in the Supervisor folder, the Worker appears in the Taskbar. Clicking the Worker Status icon opens the Status icon DNA Worker Status screen. For more information about the DNA Worker Status screen, see Understanding the DNA Worker Interface on page 57. The worker interface shows workers that are older than the current version of DNA with a light red background.
Important: All workers will need to be updated to the latest version of the shipping build of DNA as there have been numerous changes which will not allow an older worker to process jobs. Any workers that were set up with a Beta version of 3.5 should also be updated.
DNA 3.3.4 and earlier workers will uninstall automatically when the new *.msi is run. Worker update is accomplished through a Group Policy. SETTING UP A GROUP POLICY Workers should be set up on a domain that will allow a group policy to be utilized to push a newer version of the worker down to the specified machines. A group policy should then be created from the domain server with the WorkerInstall.msi that will push the worker out to the existing or new clients.
Note: See Microsoft Group Policy instructions on how to set up the policy. There is a document on Microsofts web site called Introduction to Group Policy in Windows Server 2003 that gives a good overview of Group Policy.
19
Important: Note that all commands for Macintosh, Linux, and PS3 are casesensitive. Type these commands exactly as written.
You can manually install the DNA Worker at the local machine or from the DNA Supervisor machine. INSTALLING A DNA WORKER LOCALLY ON A MACINTOSH WORKSTATION To install the DNA Worker locally, complete the following steps as user root at a terminal on the target Macintosh machine. If the SSH service on a Mac needs to be started, execute the command by starting a terminal on the Mac. Log in as root user and run: ./sbin/servicesshstart This will start the service and allow access to the Mac using SSH. Sometimes the Mac requires the Root user to install/uninstall the program. If the error: Operation not permitted. comes up, type: loginroot at the command line and provide the root password. Proceed as follows:
1. Copy workermacinstall.sh from the Windows Supervisor folder to a folder on the
Mac box using a command prompt: scpworkermacinstall.sh[Macboxname]: By default, the folder is copied to the /Users/[username]folder.
2. Once copied, logon to the box by typing sshuser@[box_name] and switch to the
root user:
2a. Loginroot. 2b. Supply your password if prompted, and press Enter. 3. Change the directory to the folder containing the file workermacinstall.sh: (should
typing: cd/opt/AccessData/DNA3/Worker
5. Run the following command to start the worker service:
./dna3workerdstart
6. Once running, the worker on this Mac box should display the IP address and name
20
./dna3workerdstop. INSTALLING A DNA WORKER REMOTELY ON A MACINTOSH WORKSTATION Before you remotely install the DNA Worker on a Macintosh machine, verify the following:
The DNA Supervisor is already installed on a Windows machine. SCP and SSH command files are available on the supervisor and worker machines. The file copied from the supervisor folder to the Macintosh workstation by whatever
means available.
Note: The workermacinstall.shworker install file can also be copied to a USB thumb drive or CD, or using a third party utility designed for remote access by IP address.
to a directory on the Macintosh machine: scpworkermacinstall.sh[Macintoshmachinename]: By default, the file is copied to the /Users/[username] directory.
3. Login as root to the Macintosh workstation. 3a. Type loginroot at the terminal and provide the root password. 3b. Enter the user password for the Macintosh workstation. 3c. Log in to the Macintosh workstation:
\sshuser@[machine_name] You may need to start the ssh service. Start a terminal on the Macintosh. While logged in as root user, run /sbin/servicesshstart
4. Go to the directory containing workermacinstall.sh; type the following:
./workermacinstall.sh
5. To change to the folder where the worker service file is located, type:
cd/opt/Accessdata/DNA3/Worker
6. To start the worker service, run the following command:
./dna3workerdstart
21
The worker runs on the Macintosh workstation and displays the IP address and machine name of the supervisor.
Note: If you get a library error when trying to start the worker, then go to the /opt/Accessdata/DNA3/Workerdirectory and type the following:
DYLD_LIBRARY_PATH=.sh./dna3workermacstart
7. To stop the worker service, run the following command:
./dna3workerdstop
8. To check the status of the worker service, run the following command:
./dna3workerdstatus
Important: Note that all commands for Linux-based boxes are case-sensitive. Type these commands exactly as written.
You can install the DNA Worker on the local machine or from the DNA Supervisor machine. Modify the hosts file under C:\windows\system32\drivers\etc to include the IP addresses of the worker machines so you can log on to the correct box and use the SCP and SSH commands for file transfer. INSTALLING A DNA WORKER LOCALLY ON A LINUX WORKSTATION To install the DNA Worker locally, complete the following steps as user root at the command line on the target Linux machine:
1. Copy the correct install file from the Windows Supervisor folder to a folder on the
Linux box using any means available. The two files are as follows: For 32-bit: workeri386install.sh
OR
22
scpworkeri386install.sh[Linuxboxname]:
OR
scpworkeramd64install.sh[Linuxboxname]: You will be prompted for your user password. By default, the folder is copied to the /Home/[username] folder.
3. Once copied, logon to the box by typing sshuser@[box_name] and switch to the
amd64install.shto: cd/home/[user_name]
4a. Run:
./workeri386install.sh
5. When prompted to install Java, click Yes. 6. Once Java is installed, go to the /opt/Accessdata/DNA3/Worker folder by typing:
cd/opt/AccessData/DNA3/Worker
7. Run the following command to start the worker service:
./dna3workerdstart
8. Once running, the worker on this Linux box should display with the IP address and
./dna3workerdstop
10. To check the status of the worker service, run the following command:
./dna3workerdstatus INSTALLING A DNA WORKER REMOTELY ON A LINUX WORKSTATION Before you remotely install the DNA Worker on a Linux machine, verify the following:
The DNA Supervisor is already installed on a Windows machine. Scp and ssh command files are available on the supervisor machine. You have a user account on the Linux machine.
To remotely install the DNA Worker from the supervisor machine:
1. Modify the Hosts file in C:\windows\system32\drivers\etc to include the IP
23
sshuser@[machine_name]
5. Switch to the root user:
su
6. (Conditional) Enter the root user password. 7. Go to the directory in which you copied workeri386install.shorworkeramd64
./workeramd64install.sh
8. When prompted to install Java, click Yes. 9. After Java is installed, go to the /opt/Accessdata/DNA3/Worker directory:
cd/opt/AccessData/DNA3/Worker
10. To start the worker service, run the following command:
./dna3workerdstart The worker on the Linux machine displays the IP address and machine name of the supervisor.
11. To stop the worker service, run the following command:
./dna3workerdstop
12. To check the status of the worker service, run the following command:
./dna3workerdstatus
24
TO INSTALL A PS3 WORKER: Prior to worker installation you must have either OpenSuSE 11 Power-PC or Ubuntu 8.10 installed as the active operating system on the PS3 box. If you have problems with the OpenSuSE 11 or Ubuntu 8.10 installation, please refer to specific documentation for that product. AccessData does not offer support for third party software. For firmware version 2.51, install OpenSuSE 11. For firmware version 2.52 or later, install Ubuntu 8.10 or later. Installing the DNA worker:
1. scpworkerppc32install.sh[PS3boxname]:directory on the PS3.
You will be prompted for your user password. By default, the folder is copied to the /home/[username] folder.
2. Once copied, logon to the box by typing sshuser@[box_name] and switch to the
cd/home/[user_name]
4. Install the worker by running:
shworkerppc32install.shinstall
5. Go to the /opt/Accessdata/DNA3/Worker folder by typing:
cd/opt/AccessData/DNA3/Worker.
6. Run the Worker by typing:
./dna3workerdstart Once running, the worker on this PS3 box should display the IP address and name of the worker machine connected to the Supervisor.
7. To stop the worker service, run the following command:
./dna3workerdstop
8. To check the status of the worker service, run the following command:
./dna3workerdstatus To stop the worker service: Run the following command from the AccessData folder to stop the worker service: ./dna3workerdstop Should you need to uninstall the worker:
25
./dna3workerdstop
2. Change to the /Home/[username] directory. 3. Type:
shworkerppc32install.shuninstall For more information regarding uninstalling other DNA workers, see Uninstalling the DNA Worker on page 28.
LICENSING
You can manage product licenses on a dongle using LicenseManager. For information about installing LicenseManager, see Installing LicenseManager on page 12. For information about starting LicenseManager, see Chapter 10 Managing Security Devices and Licenses on page 147.
UNINSTALLING PRTK
You can uninstall PRTK just as you would typically remove other programs from the Windows Control Panel. To uninstall the PRTK program:
1. Under the Start menu, select Control Panel > Add or Remove Programs. 2. Select AccessData PRTK 6; then click Remove.
26
3. Select Uninstall PRTK 6; then click Next. 4. Click Yes to proceed with the uninstall. 5. Click Finish to complete the uninstall.
Important: After the uninstall is complete, there are still some files left on your computer. Go to [drive]:\DocumentsandSettings\AllUsers\Application Data\AccessData\PRto see these files. You may wish to keep these files, or if the computer will no longer be used for password recovery, delete the \PR\ folder to complete the uninstall.
To uninstall the CodeMeter Runtime software if no other AccessData products are installed or to be installed on this computer:
1. Under the Start menu, select Control Panel > Add or Remove Programs. 2. Select the CodeMeter Runtime Kit v3.30a, then click Change/Remove. 3. Click OK to proceed with the uninstall. 4. Click Finish to complete the uninstall.
To uninstall the dongle drivers if they are no longer necessary for other programs on this computer:
1. Under the Start menu, select Control Panel > Add or Remove Programs. 2. Select the AccessData Dongle Driver; then click Change/Remove. 3. Click OK to proceed with the uninstall. 4. Click Finish to complete the uninstall.
Partial uninstall: Removes the DNA program files. You can select a partial uninstall if
a program file becomes corrupted. You can then re-install the supervisor without losing your customized DNA files, such as profiles, rules, and the communication keys. For more information, see Supervisor Installation on page 13.
Full uninstall: Removes all files in the Supervisor directory, including program files
and customized files. If you perform a full uninstall, the workers subordinate to the supervisor stop processing jobs, unless you back up the supervisor keys first. To backup the supervisor keys, refer to Backing Up and Restoring Keys on page 54.
27
Important: After the uninstall is complete, there are still some files left on your computer. Go to [drive]:\DocumentsandSettings\AllUsers\Application Data\AccessData\PRto see these files. You may wish to keep these files, or if the computer will no longer be used for password recovery, delete the \PR\ folder to complete the uninstall.
To uninstall the CodeMeter Runtime software if no other AccessData products are installed or to be installed on this computer:
1. Under the Start menu, select Control Panel > Add or Remove Programs. 2. Select the CodeMeter Runtime Kit v3.30a, then click Change/Remove. 3. Click OK to proceed with the uninstall. 4. Click Finish to complete the uninstall.
To uninstall the dongle drivers if they are no longer necessary for other programs on this computer:
1. Under the Start menu, select Control Panel > Add or Remove Programs. 2. Select the AccessData Dongle Driver; then click Change/Remove. 3. Click OK to proceed with the uninstall. 4. Click Finish to complete the uninstall.
28
If you are prompted that the application is still running, right-click the key icon in the Taskbar and select Exit.
3. Click OK to remove the DNA worker and all its components. 4. Click Finish.
./dna3workerdstop
3. Press Enter 4. Run the install*.sh file from the folder you copied it to with the additional
For example:
4a. On a Macintosh workstation, type:
shworkermacinstall.shuninstall
OR
./workermacinstall.shuninstall
4b. On a Linux-based machine, type:
shworkeri386install.shuninstall
OR
./workeri386install.shuninstall
4c. On a PS3 machine, type:
shworkerpowerpcinstall.shuninstall
OR
./workerpowerpcinstall.shuninstall
29
This command will remove the AccessData/DNA3/Worker directory and the related symbolic links.
Note: The ./worker... accomplishes the same thing as shworker...
30
This section acquaints you with the basic features of both AccessData Password Recovery Toolkit (PRTK) 6.5 and AccessData Distributed Network Attack (DNA) 3.5.
To run DNA, click Start > All Programs > AccessData > Distributed Network Attack > Supervisor.exe.
OR
When starting, PRTK and DNA search for a license. If you do not have a CmStick or a dongle or if the CodeMeter software or the device drivers are not installed correctly, then the product runs in demo mode, allowing you to run decryption jobs on a limited number of file types. For more information, see, Running PRTK or DNA in Demo Mode on page 32.
PRTK and DNA use services to handle password recovery functions. The services must be running for PRTK to successfully do its job.
Typically, the services are started when PRTK is started, and the services are stopped when PRTK is stopped.
31
When DNA is installed, the services start automatically and continue to run, even when the User Interface is closed. If PRTK or DNA does not start properly, see Chapter 11 Troubleshooting on page 173.
Use LicenseManager to manage your product licenses once the CmStick and the CodeMeter software, or the CodeMeter software, the dongle device drivers and the dongle are installed on your decryption computer. For more information, see Chapter 10 Managing Security Devices and Licenses on page 147.
Zip Dictionary Attack Old Format PGP Secret Key Ring Dictionary Attack PGP Disk 4.0/5.0/6.0 Dictionary Attack PGP Secret Key Ring Dictionary Attack
32
RIGHT-CLICK MENUS
Throughout the interface you can right-click the mouse to see features specific to the context of the tasks you are performing.
33
removes the check mark next to that element, indicating that it is not being displayed in the view. Figure 3-1 The PRTK Interface
The DNA interface is essentially the same as the PRTK interface, with the addition of the Priority Groups Pane, as seen in the following figure: Figure 3-2 The DNA Interface
34
35
36
37
File Properties
38
TABLE 3-5 Help Menu Items Menu Item Online Support Description Opens the AccessData Website to the Support Page where you can easily find a variety of AccessData product support information. Opens a view of the up-to-date listing of the Recovery Modules available for this version at the time of release. Opens a view of the specific version and copyright information for this release of the product.
CHANGING PREFERENCES
To access the Preferences page, click Edit > Preferences. You will see four tabs:
39
GENERAL TAB
The General tab provides the following Recovery Options, as illustrated in the figure below: Figure 3-4 Job Preferences General Tab:
SPECIFYING RECOVERY OPTIONS You can set default recovery settings to use when processing jobs in the recovery session. By default, the program does not automatically decrypt a file after a key is discovered. You can choose to have the key automatically applied to the file, and you can receive an email when the job is completed. You can configure both these features in the Recovery Options section of the Preferences form. DECRYPT FILE WHEN KEY IS FOUND Allows you to specify a location the same as or different from where the original file was stored when it was added to DNA. If saved in the same folder, the word decrypted will be appended to the file name. To automatically decrypt the file after a key is found:
1. Select Edit > Preferences. > General.
40
2. Check the Decrypt File When Key Is Found box. 3. Select Save in Same Directory as the Encrypted File, or select Save In and browse to and
select the desired directory. The directory of the encrypted file is the directory that you added the encrypted file from using the Add Job Wizard, or the folder you dragged and dropped the file from when you added it to the Job Queue. You might want to specify a different directory if you want to keep all decrypted files in one location.
Note: After a file is decrypted with a key, the filename is appended with -decrypted: for example, file1-decrypted.xls. 4. Click OK.
SAVING DECRYPTED FILES MANUALLY After PRTK recovers the decryption key of a file, you can manually decrypt and the decrypted file will be saved automatically. To decrypt a file after recovering the key:
1. In the PRTK window, right-click a job that has a recovered decrypt key. 2. Select Decrypt from the menu. 3. Specify where to save the decrypted file.
SEND AN EMAIL WHEN JOB HAS BEEN COMPLETED Allows you to specify whether to send an email when a job is completed, and to specify the address and details of where that email should be sent. To receive an email after a job is completed:
1. Select Edit > Preferences > General. 2. Check the Send an Email When Job Has Been Completed box. 3. In the Email Address field, enter the recipients email address. 4. In the SMTP Server field, enter the name of the SMTP server for the specified email
address.
5. In the Port field, enter the port number. 6. Click Test to send a test email to verify that the email address and SMTP server
information is working.
7. Click OK.
41
Important: Sending an email works only with servers not requiring SMTP authentication.For an explanation of encrypted files, see Understanding Encrypted Files on page 217.
42
If you are setting workers up on systems where employees normally work during the day, for example, selecting this option prevents jobs from being processed during the times when the employee would be doing normal work. Each time mouse or keyboard input is detected, the worker is suspended for approximately 10 minutes, then resumes if no further activity is detected.
DROPFOLDER TAB
The DropFolder tab gives you the option of setting up a dropfolder for adding jobs. The dropfolder will be monitored by DNA and jobs are processed in the order they are
43
added to the dropfolder. When jobs are completed, they will be placed according to the options you selected under the General preferences tab. Figure 3-7 Setting Preferences on the General Tab
In addition to setting up the dropfolder, you can specify the maximum number of files to be processing at the same time that have been added through using the dropfolder. This number does not include files added by drag and drop or using the Files > Add Files menu or the Add Files button.
THE TOOLBAR
The Toolbar provides easy access to various functions in PRTK and DNA. Figure 3-8 The PRTK and DNA Toolbar
44
The following table shows each Toolbar icon and describes its function:
TABLE 3-6 Toolbar Icons and Functions Toolbar Icon Function Generate a Report for the current recovery session. Select files to add to the recovery session. Pause All Jobs. To pause a single job, select one job and right-click. Click Pause. Resume All Jobs. To resume a single job, select one job and right-click. Click Resume. Delete All Jobs. To delete a single job, select one job and right-click. Click Delete. Manage Profiles. Open Dictionary Tools. Verify Hashes. Access Preferences. Open Help Topics.
45
TABLE 3-7 Job Queue Pane Group Attack Type Description The attack type used to decrypt the file. The following are the possible attack types: Dictionary Decryption Keyspace Reset If DNA is using either the dictionary or keyspace attack, more specific information is listed about the type of attack being used. For more information on the attack types, seeUnderstanding the PRTK & DNA Decryption Process on page 218. Status Current status of the Job in the Queue. Possibilities are:
JOB PROPERTIES
Double-click or right-click on a job and select File Properties to open the Properties view of the highlighted job file. Three Tabs display:
Information: displays file name, file information, job properties, and job results. Rules: displaying the percentage of the job Rules that are unassigned, assigned,
completed, or failed.
46
screen is refreshed, the comments field is cleared, so there is no way to save changes made here once the job is added. The following Buttons are available on all tabs:
Apply: Click Apply to save changes to the Rules tab, specifically when marking or
unmarking either Logarithmic or Automatic Refresh.
Cancel: Click Cancel to close any dialog without saving. OK: Click OK to close the dialog.
Jobholder Pane. Simply click on an attribute column heading and drag it to the left or right until it is in the position you prefer, then release the mouse button. Changing the Sort Order in the Job Queue Pane.
PRTK and DNA let you sort files by their file properties.
47
The following table describes the file attributes listed in the Properties Pane for a selected file:
TABLE 3-8 Properties Pane Attributes and Descriptions Attribute Name Job Information Filename Attack Type Module Profile Status Difficulty Path and filename of the file Attack type based on password recovery or decryption method (decryption or dictionary) Name of password recovery module Name of profile used with job Status of the password recovery process (finished, running, depends on, paused, waiting) Easy, moderate, or difficult password recovery Attribute Description
48
TABLE 3-8 Properties Pane Attributes and Descriptions Attribute Name Begin Time End Time Decryptable Result Type Results Comments File Information Filename Type Version Size MD5 SHA-1 Created Modified Path and filename of the file File type based on analysis of file Version of source application based on analysis of file File size MD5 (128-bit) hash of the file contents SHA (160-bit) hash of the file contents Date and time file was created Date and time file was last modified Attribute Description Start time of recovery process End time of recovery process Decryption method can be used on file Type of result Results of the password recovery Specific comments you entered about the file when adding the job
To view more attributes, double-click the selected file. See Monitoring Jobs on page 75.
49
however, Waiting and Finished jobs cannot be changed. The following table describes all groups in the Priority Groups list.
TABLE 3-9 DNA Priority Groups Group High Description The most urgent priority group for jobs in DNA. Jobs classified in this priority group are processed according to the order they are added to the group. By default, 90% of all available resources in the group or DNA system process jobs in the High Priority group, leaving 10% of resources to continue working on Normal Priority jobs. Normal The basic priority group in DNA. Jobs classified in this priority group are processed according to the order they are added to the group. By default, 10% of all available resources in the group or DNA system process jobs in the Normal Priority group. Waiting The group for jobs that are paused or waiting for another job to complete, or that have timed out. Jobs move out of this group after their processing is resumed. Finished The group that displays all processed jobs.
50
In PRTK, management tasks include defining Rules, Profiles, and Dictionaries, setting Preferences, and customizing the Interface.
DNA management tasks include the same tasks as in PRTK, but also include backing up
the keys used for communication, managing Workers, and stopping or starting the Supervisor. This chapter covers management tasks specific to DNA. Figure 4-1 The DNA Interface
51
By default, the interface automatically displays Priority Groups, Jobs Queue Pane, and Properties of the currently highlighted jobs. If you make changes to the view and want to quickly reset it to the default, click View > Reset Views. For information regarding customizing the User Interface, see Customizing the User Interface on page 33.
3. In the Server field, enter the IP address of the DNA Supervisor machine. 4. In the Port field, enter the desired port number connection. The default port for the
Supervisor is 49170.
52
Important: Do not restart the worker if you know it is currently processing jobs. If you restart the worker while it is processing a DNA job, then the work already completed on the job will be lost.
Click Start > All Programs > AccessData > Distributed Network Attack > Worker.
2. On a Macintosh or Linux machine, complete the following: 2a. At the command line of the machine, go to the /opt/Accessdata/DNA3/Worker
directory.
2b. Type ./dna3workerdrestart Note: You must have administrator rights to restart a worker.
53
BACKING UP KEYS
You can back up the key pair on the supervisor as a preventive measure against data loss. Backing up keys is also useful if you need to re-install the Supervisor.
Important: It is a good idea to backup the Supervisor Keys to either a network location or a removable media type. Doing so can save you from
having to re-install every worker if a Supervisor re-install is necessary. The backup keys can be restored to a Supervisor to maintain the communication with the current DNA Workers. If you re-install the supervisor without backing up and then restoring keys, the workers will be able to connect to the Supervisor but will not be able to process any jobs. In this case you must reinstall or update all the Workers before you can again process jobs. You can use the backup keys for a partial installation of DNA. Before you start the installation, you must complete a partial un-install. If you perform a completely new install, new keys are created. Figure 4-3 Backup Keys
54
2. Browse to and select the backup location for the keys; then click Select. The file
RESTORING KEYS
You can restore the key pair to the Supervisor if you experience a loss of data. For example, if the entire system or a DNA Supervisor hard drive is lost, you can install a new version of DNA and restore the backup keys, assuming the backup was stored on a different system or a removable media type. As long as the hostname and IP address of the supervisor remains the same, the supervisors and workers do not have to change any configuration to work with the restored system. To restore the keys:
1. Select Tools > Restore Keys. 2. Browse to and select the supervisor.ini; then click Select.
55
TABLE 4-1 DNA Workers Information Screen Component Status Bar Description At the bottom of the screen you will see information regarding
Information for the Supervisor these workers are connected to. Time until next refresh
directory. Type./dna3workerdstatus
56
If you have performed a stealth installation of the worker, you will not see the Worker icon in the Windows System Tray. You can access the DNA Worker interface by doubleclicking Worker.exe in the[drive]:\ProgramFiles\AccessData\DNA3\Worker directory. The following table describes each component of the DNA Worker interface:
TABLE 4-2 DNA Worker Information Components Component Worker Information Elapsed Idle Time Connected Name/IP - Supervisor Name/IP - Worker Idle time in HH:MM:SS since this worker was last active. Yes or No, depending on whether this DNA Worker is connected to a supervisor. Network name/IP address of the connected supervisor Network name/IP address of this worker Description
57
TABLE 4-2 DNA Worker Information Components Component Working Processors Idle Processors Processor Speed Last Supervisor Contact Time Release Version Job Information Task Assigned - Worker Time Expected Task Completion Worker Time # of Passwords in task Passwords / Second Job Name
HH:MM:SS Time spent so far on the assigned job or task. HH:MM:SS Estimated time remaining to allow the worker
Description The number of physical processors on the DNA Worker machine that are currently working on DNA jobs. The number of physical processors on the DNA Worker machine that are not currently working on DNA jobs. Speed of the processor on the motherboard of this machine.
MM/DD/YY HH:MM:SS of last contact with the
Supervisor.
DNA installed release version information.
to complete the current task. Number of passwords found for this job or task. This number increments as passwords are found. Current average passwords being tested per second. Job name of current file being processed.
58
To access the Workers Information dialogs, click View > Workers Information. To access the Workers List, click View > Workers Information. Figure 4-5 Viewing Workers Information
As you can see from the following figure, the Groups can be filtered by status: Working, Idle, Connected, and Not Connected. The Groups can also be filtered by name: Default, Dictionary, and Trusted are the default groups. You can create new groups to meet your needs. Figure 4-6 Selecting a Worker Filter
59
You can update the Workers List on the Filter section of the Edit Groups form. The following table describes the Filter form:
TABLE 4-3 Apply Filter Options Component Field Description A drop-down list that contains the following columns to sort by:
Name: The computer name of the worker. IP Address: IP address of the worker. Processors: The total number of physical processors on the supervisor
or worker machine. Expression Enter any regular expression, including the following:
Period (.) to match any character. Asterisk (*) to repeat the last character. Plus Sign (+) to repeat the previous character. [xy] to signify the OR operation, and to specify a range of letters.
Access A drop-down list of Allow or Deny that corresponds to the entry in the Expression field.
contained in that groups definition. To clear the filter, click Clear. The current filter will be cleared, but not removed from the list.
60
The Properties screen contains three windows organized as tabs, each with a particular focus or function. The tabs are labeled Information, Passwords/Second, and Availability. Each tab is discussed in the following sections.
Note: You can resize the Worker Properties screen if desired.
The window is divided into one category about the worker and one category about the groups that the worker belongs to. Each category is discussed in the following sections.
61
WORKER INFORMATION The following table describes the Basic Information section:
TABLE 4-4 Basic Worker Information Item Hostname Connected Processors Power Last Contact Time The last date and time this worker had contact with the Supervisor Release Working On The program release and build of the DNA worker software. The filename of the job currently being processed. Description The workers network name. Yes or No, depending on whether the worker is connected to the supervisor. The number of internal processors this worker has
GROUP INFORMATION The following table describes the Group Information section:
TABLE 4-5 Available Group Information Item Processors Power Description The total number of physical processors on the worker machine. The processor speed of the machines physical processors. The program will average the processing speed of multiple processors selected. The last date and time the supervisor contacted the worker. The version of the DNA that the machine is running. The job name and attack type that the worker is processing. This field might be blank if the worker is not currently processing a job. Group List Change Group Membership Names of groups that the worker belongs to. Opens the Change Group Membership form so that you can quickly add or remove the worker from the listed groups. For more information about this form, see Changing the Group Membership of a DNA Worker on page 118. Restart Prompts to either restart the supervisor or worker or cancel restarting. You might restart the resource to update its group membership in the DNA management interface.
62
TABLE 4-5 Available Group Information Item Item Processors Power Description Description The total number of physical processors on the worker machine. The processor speed of the machines physical processors. The program will average the processing speed of multiple processors selected. The last date and time the supervisor contacted the worker.
AVAILABLE GROUPS The Available Groups pane lists groups that this worker is not currently a member of.
PASSWORDS/SECOND TAB
The Passwords/Second window displays a graph of the number of passwords per second that are tested for validity over a given amount of time on the selected worker. The following figure shows the Passwords per Second tab: Figure 4-8 Worker Properties Passwords per Second
When viewing the properties of an individual worker, then this graph displays the passwords per second of the worker for the specified interval. The bottom of the
63
window displays the average number of passwords per second for the selected time interval. Password statistics can be misleading because some types of encryption, such as Pretty Good Privacy (PGP), take more effort to test passwords on than other types of encryption, such as a Zip file. Also, the same encryption type can contain options that take longer to test. For example, one machine performing 1,000 password tests per second on a PGP disk file is working much harder (or much faster) than another machine performing 1,000,000 password tests per second on a Zip file.
AVAILABILITY
The Availability window displays a graph of the time when the worker is available. The following figure shows the Availability tab: Figure 4-9 Worker Properties Availability
The Availability axis simply depicts if the resource is available or not; the range of numbers along the axis is purely for computational purposes. The bottom of the window displays the approximate availability for the selected time interval. The Availability statistics are useful metrics in understanding when the worker is most or least available to process jobs. Availability is not configurable.
64
CREATING A GROUP
You can create a group to manage DNA workers. For example, if a DNA supervisor manages 30 worker machines, you might create three groups of ten workers, each based on location or processing power. If you have a job that requires a quicker decryption rate, you can assign it to the most powerful group. By default, DNA creates three groups:
Default: Use to process the majority of files. All workers are assigned to this group. Trusted: Use to process ZIP, ARJ, RAR, PGP, Invisible Secrets, and EMFfiles. You
must assign workers to the Trusted group before DNA can process jobs with the group. For more information, see Changing the Group Membership of a DNA Worker on page 118.
65
3. In the Group Name field, enter the name of the group and click OK. You might
4. After you create a group, you can then assign workers to the group using the Filters
feature.
EDITING A GROUP
You can edit an existing group to better suit your needs. To edit a group:
1. Click Manage Groups in the AccessData DNA Workers View.
2. Select the group that you want to edit from the Manage Groups list and click Edit.
To change the group name, enter the new group name in the field. To specify the speed at which DNA downloads dictionaries to the workers, select
the type of network connection for the group and the percentage of connection bandwidth to use.
66
To apply a filter to the group, click Add and complete the Filter section of the
page.
3. After the changes are complete, click OK.
You can manage the Groups to help manage the Workers List. The following table describes the Edit Group Properties dialog:
TABLE 4-6 Edit Group Properties Component Properties Name The name of the group being edited Network Traffic Restriction Restricts a group to use only certain network types. Options include: Description
DSL 2 ISDN B Channels ISDN B Channel 56k Line 33.6 Modem 28.8 Modem 14.4 Modem
This is a sliding scale from 0 to 100% of available bandwidth that this group is allowed to use. Access to the Supervisor. Options are:
Include Exclude
Column A drop-down list that contains the following columns to sort by: Name: The computer name of the worker. IP Address: IP address of the worker. Processors: The total number of physical processors on the supervisor or worker machine. Group Name(s) Pattern The pattern to follow, narrowing or broadening the workers to include in this group. Options are:
67
Is Begins With
Once you have made your filter selections in the long text box below the Access, Column, and Pattern boxes, type the corresponding data that matches your Pattern selection, then click Add. In the Workers List below the filters you have set, you will begin to see the workers that match the filter display. You can do this for the Default, Dictionary, and Trusted groups, and for any custom groups you create.
DELETING A GROUP
It is possible that a group you have created in the past may outlive its usefulness. You can delete such a group easily. To delete a group:
1. In the Workers List, click Manage Groups. 2. In the Manage Groups list, select the group that you want to delete and click Delete. 3. Click Close. Note: You cannot delete any of the three default groups. You can only delete custom groups.
68
2. In the Workers List, right-click the worker you want to assign or change the Group
the left, select the group to assign from the Available Groups list on the right, and click the double-arrow button to move it to the Current Group Membership list on the left.
4. Click OK to save the changes and to close the Worker Properties box.
worker from.
2. Click the right-arrow button to move the unwanted group to the Available Groups
list.
3. Click OK to save the changes and to close the dialog.
69
2. Enter the IP address of the new Supervisor, or select it from the drop-down list. 3. Click OK to save changes and close the dialog, or click Cancel to abandon changes
70
PRTK 6.5 and DNA 3.5 let you add files to recover passwords, monitor recovery jobs, view recovery results, verify hashes, and print recovery reports.
Each job must be associated with a profile, which will be used during the recovery process. A profile defines details such as the dictionaries and rules to be used in the recovery process.
71
You can associate your job with the default profile, another included profile, or you can create your own customized profile. For more information, see Setting a Default Profile on page 96 Figure 5-1 Add Job Wizard Page 1 of 2
72
After you select a profile, if more than one attack type is available, you are prompted to verify which attack types to run. Figure 5-2 Add Job Wizard Page 2 of 2
PRTK or DNA generates the Rules and the necessary attack type(s), adds the job(s) to
the list of jobs in the Job Queue Pane, and displays the job(s) in the View All tab.
PRTK or DNA then creates hash values for the files and performs the recovery process
on the added jobs, which you can pause and resume. You can stop a job by deleting it.
Note: After you start a job, do not move the original files from the original location they were added from, until after the related job(s) complete.
While jobs are being processed, you can continue to add files. If you have defined a DropFolder, the files added there do not affect the jobs added manually.
73
If a desired file on a network is larger than 10 MB, copy the file to the supervisor
machine and then add it locally. While a removable drive is considered local, the connection to that drive may cause a bottleneck and slow processing.
Do not run a job on network drives or folders. Processing files across the network
generates a large amount of network traffic.
ADDING JOBS
You can add files to be recovered by selecting files, or by dragging and dropping files into either the Job Queue Pane or into the DropFolder if you have one defined. When you add a job, the job must be associated with a profile. The original source application doesnt have to be installed on the machine in order for DNA to process the job. By default, PRTK and DNA include several profiles, some are exclusively for English files. You can associate your job with the default profile, or you can create your own profile that is more specific to the file that you are working with. For more information, see Creating a Profile on page 72.
SELECTING FILES
You can add files to be recovered by selecting files. To select files for a recovery job:
1. From the menu bar, select File > Add Files. OR
2. Browse to and select the file or files you want to add as job(s).
Press Shift+click to select multiple contiguous files. Press Ctrl+click to select multiple discontiguous files.
3. Click Add. PRTK or DNA analyzes the file type and determines which attack types can be performed. 4. In the Add Job Wizard (Page 1 of 2), select the profile to use on these files for this
module options you want for each file; then click Finish.
74
Note: If this has not been done in the past for the specific file type being added, the dialog will come up. If this has been done and the Select File Type Defaults button has been marked for this particular file type, you may not see this option dialog. PRTK or DNA generates the recovery process settings for the job and displays an
Important: This feature currently does not work in Vista. You can still add jobs by selecting files, as detailed in the above section.
To drag and drop files into PRTK or DNA:
1. In Windows Explorer, select the file(s) you want to add as a job.
Press Shift+click to select multiple contiguous files. Press Ctrl+click to select multiple non-contiguous files.
2. Drag and drop the selected file or files into the Job Queue Pane. PRTK or DNA analyzes the file type and determines which attack types can be
performed.
3. In the Add Job Wizard (Page 1 of 2), select the profile to use on these files for this
module options you want for each file; then click Finish.
Note: If this has not been done in the past for the specific file type being added, the dialog will come up. If this has been done and the Select File Type Defaults button has been marked for this file type, you may not see this option dialog. 5. PRTK or DNA generates the recovery process settings for the job and displays an
MONITORING JOBS
After you add a job to the job queue, you can monitor the job in several ways, including monitoring the password attacks or looking at statistics and graphical analyses of that job.
75
section reviews the tools you can use to manage the recovery session:
76
REMOVING JOBS
You can remove all jobs in the recovery session or selected jobs only. To stop processing and remove all jobs, click File > Delete All. To stop processing and remove selected jobs:
1. Select the job(s) you want to remove. 2. Right-click the selected job(s). 3. Click Delete.
Double-click a job. Right-click a job and select File Properties. Select a job and click View > File Properties.
The Job Properties screen contains three windows organized as tabs, each with a particular focus or function. Each tab is discussed in the following sections. You can resize the Job Properties screen if desired. To close the Job Properties screen, click OK or Cancel.
77
The window is divided into four categories. Each category is discussed in the following sections. BASIC INFORMATION The following table describes the Basic Information section:
TABLE 5-1 Basic Job Information
Item
Name Comments
Description
The job name. Once created and added, this cannot be changed. Any comments you entered in the Add Job Wizard, or any commands from the Job Properties screen. You can also add comments here while the job is running.
78
FILE INFORMATION The following table describes the File Information section
TABLE 5-2 Job File Information
Item
Filename Type Version Size Created Modified
MD5 SHA-1
Description
Filename of the job. Application that the file was created in. Version of the file format recognized by PRTK modules. Size of the file in bytes. Date and time that the file was originally created, if available. Date and time that the file was last modified.
MD5 (128-bit) hash of the file data. SHA (160-bit) hash of the file data.
PROPERTIES The following table describes the Properties section on the Job Information Tab:
TABLE 5-3 Job Properties Information
Item
Attack Type Module Profile
Description
Attack type used for this particular instance of the job. Recovery module used for the attack. The module is based on the combination of file type and the attack type. The profile assigned to the job using the Add Job Wizard.
79
Item
Status
Description
The status of the job. The following are the possible states:
Depends On: The job is dependent upon the completion and results of
another job before it can start its processing.
Finished No Passwords Found: The job is completed and no passwords were found.
Paused: The job is paused. Queued: The job is not yet assigned for processing. Running: The job is being processed. Waiting: The job is dependent upon the completion of, or timeout of,
another job before it can start its processing. Begin Time End Time Timeout The date and time that processing began. The date and time that processing finished. How long PRTK or DNA performs the dictionary attack before it times out and begins a different attack. This is set in the Add Job Wizard, Page 1 of 2, under Timeout.
Note: For very large jobs, it may be best to set the Timeout to No Timeout. Otherwise, it can timeout before the job even gets added.
Groups
The groups to which the job is assigned. Default group names are:
RESULTS The Results section displays the passwords and keys that PRTK discovers during the decryption process. The Results section might have multiple entries even if a password is discovered in the first entry. Some files, such as Adobe* PDF documents and Word documents, can have
80
multiple passwords. Even though one password is discovered, more tests might still be running on lower priority Rules. The following table describes the Results section.
TABLE 5-4 Job Results Information
Column
Type Data Description
Description
Either password or key, depending upon what is decrypted first. The actual password or key that decrypts the file. The type of password or key that is found. The type is defined by the specific application that the file was encrypted in. The following are possible types: File, User, Owner, Administrator, Assistant, Reader, Definer, Supervisor, Spare, Possible, Read-Write, Service Website, Field, Write Reservation, Option Protect, Sheet, Save As, Title, Protection, Transaction, Data Entry, Payroll, Spare User, Pass Key, and Zip Key.
Found In
The Rule and corresponding dictionary that the password or key was discovered in.
81
You can zoom in on the graph to display a greater level of detail. Click the desired region and drag the mouse to create a rectangle that covers the area you want to see. The following table describes the information displayed in the Rules tab:
TABLE 5-5 Job Rules Information
Component
Name
Description
The name of the job about which recovery Rule information is displayed.
82
Component
Legend
Description
A color key for the Rules displayed in the graph. The following list describes each Rule:
Unassigned: A Rule has not yet been assigned to that job. Assigned: The Rule is assigned to be processed. Completed: The Rule has completed processing. Unassignable: The Rule has been allocated to another
resource.
Failed: The Rule was assigned, but the program did not return
the results. Rules Rules information related to the selected profile. The information categories are as follows:
ID: The ID number assigned to the Rule by PRTK or DNA Description: The Rule and corresponding dictionary that the
Rule is run on. If you do not want to process a Rule in the graph, right-click the Rule before it is assigned, and select Skip. A skipped Rule is not processed.
Note: A skipped Rule is immediately marked as 100% complete.
Percent Complete: The percentage of password or key combinations that have been tried for that Rule.
Size: The total number of possible password or key combinations produced by that Rule.
The Rules tab graph can be displayed two different ways. By default, PRTK displays the graph with the Logarithmic box checked. The graph displays great detail about how many tries are attempted at each recovery Rule. The graph shows a relative view of the number of tries that are shown so that you can see each attempt in greater detail. If you uncheck the Logarithmic box, then click Apply, a larger-scale graph displays that shows a more general view of the Rule progress. An example of this type of graph is shown below. The non-logarithmic graph displays the last few Rules much larger than
83
all the others. This type of graph displays the comparative relationships between the Rules more accurately. Figure 5-5 Job Properties Job Rules Without Logarithmic Display
You can set the view on the Rules tab to refresh automatically, or to manually refresh. To change the Refresh setting:
1. Mark the box labeled Automatic Refresh to have this screen update itself
automatically. This setting deactivates the Refresh button. OR Unmark the Automatic Refresh box to disable automatic refresh and activate the Refresh button. Click Apply to save your changes.
2. Click OK to close the entire Properties dialog.
PASSWORDS/SECOND
The Passwords/Second window displays a graph of the number of passwords per second that are tested for validity over a given amount of time on the selected job. The
84
bottom of the window displays the average number of passwords per second for the selected time interval Figure 5-6 Job Properties Passwords/Second Display
Password statistics can be misleading because some types of encryption, such as PGP, require more effort and time to test passwords than other types of encryption, such as a Zip file. Also, the same encryption type can contain options that take longer to test. For example, one machine performing 1,000 password tests per second on a PGP disk file is working much harder (or much faster) than another machine performing 1,000,000 password tests per second on a Zip file.
85
Reports contain file attributes information, including filename, registered type, identified type, size, file version, created, modified, and hash values (SHA and MD5). For information on attributes, see Displaying Job Properties on page 77. To print a recovery report:
1. Select File > Generate Report. 2. Browse to the location for saving the report. 3. Give the report a name. 4. Click Generate.
86
87
Chunk size is the amount of the password set or keyspace the Supervisor sends to the Worker, anticipating what the Worker can process in the amount of time allotted. To change the process duration,
2. Slide the bar right to increase the number of minutes, or left to decrease the number
of minutes.
3. Click OK.
To change when the workers process jobs, check the Stop Workers on Mouse or Keyboard Input box. This suspends the processing of jobs by the worker while the human user is active on the computer. When mouse or keyboard activity stops and remains inactive for approximately ten minutes, the Worker will resume processing of jobs automatically.
priority group to High if you want the job to be processed more quickly. Or change the
88
priority group to Normal if you want to place a different job or jobs in High priority status. The following figure illustrates this: Figure 5-8 Changing Priority Groups
89
3. In the New Priority field, click the up or down arrows until you reach the desired
priority. OR Clear the current entry in the New Priority box, and type in the new priority number you want to assign for this job.
4. Click OK.
90
password field and press Ctrl-v to paste the recovered password from the clipboard. OPENING A FILE WITH A RECOVERED PASSWORD After PRTK or DNA recovers a password, you can open the file in its original application from within PRTK or DNA.
Note: To open a file, the application in which the file was created must be available. For example, to open an Excel file, you must have Microsoft Excel installed on the computer.
91
1. In the PRTK or DNA Job Queue pane, right-click a job that has a recovered password
the clipboard. For an explanation of encrypted files, see Understanding Encrypted Files on page 217.
created in other languages, including Arabic, French, German, Italian, and Spanish.
92
When recovering passwords containing Extended ASCII or Unicode characters, PRTK displays password characters using the Microsoft Sans Serif font. Before opening a file, you need to determine the Alt keystrokes to enter for the password when opening the file. To recover a password that has international characters:
1. After recovering a password with international characters, open the Windows
Character Map by clicking Start > Programs > Accessories > System Tools > Character Map.
2. Select the Microsoft Sans Serif font.
Important: Make sure you are using the correct font. PRTK and DNA use Microsoft Sans Serif, and not MS Sans Serif.
3. In the lower-right corner of the window, find the Alt- keystrokes necessary to enter
the character code displayed in the Microsoft Sans Serif character set.
Note: When entering Alt- keystrokes, make sure NUM LOCK is on. Hold down ALT; then, using the numeric keypad, type 0 (zero) followed by the character code number.
93
94
Before a job can be processed in PRTK or DNA, it must be added to an existing profile. A profile is a collection of specific rules, dictionaries, and other settings that are pertinent to a category of encrypted files.
DEFAULT PROFILES
PRTK and DNA share the same profile names. The following details the default profiles installed with PRTK and DNA, and a description of each. TABLE 6-1 Default Profiles
Profile Name
English (default)
Description
Begins by searching for simple passwords, followed by dictionary and permutated dictionary searches, and ends with complex searches for dictionary and computed passwords. All default English dictionaries and character sets are used. Begins by searching for simple passwords, followed by, dictionary and permutated dictionary searches, and ends with complex searches for dictionary and computed password. All default Arabic dictionaries and character sets are used. Begins by searching for simple passwords, followed by dictionary and permutated dictionary searches, and ends with complex searches for dictionary and computed passwords. All default German, French, Italian and Spanish dictionaries and character sets are used. Begins by searching for simple passwords, followed by, dictionary and permutated dictionary searches, and ends with complex searches for dictionary and computed password. All default Russian dictionaries and character sets are used.
Arabic
European
Russian
95
Profile Name
Pass-phrase FTK Import PRTK (PRTK only)
Description
Uses all pass-phrase Rules in English Used as a template for FTK imported word lists Rules in this profile are ordered by research conducted on recovered passwords. Each Rule completes in 24 hours or less based on a job processing 200,000 passwords per second. Rules in this profile are ordered by research conducted on recovered passwords. Rules that can complete in five days or less are processed first, followed by Rules that take longer than five days to process (based on a job processing 200,000 passwords per second on one worker).
96
2. In the Manage Profiles list, select the profile that you want to set as the default, and
CREATING A PROFILE
You can create profiles specific to the files or cases with which you are working. For example, if you have a collection of encrypted files from a case that has documents in both English and Arabic, then you can create a profile that includes only English and Arabic dictionaries. When PRTK or DNA processes the files, it only runs the selected rules on the selected dictionaries. This limiting process speeds up the decryption process for your files, and increases the likelihood of success. Figure 6-2 The DNA Profile Definition Pane
You can use the New Profile pane to name the profile and select the languages, character groups, dictionaries, and rules to include in the profile. Some selections are made by default, but they can be changed. You must give the profile a name before clicking OK, or you will be prompted to do so.
97
Option
Description Languages
Description
Information about the profile, including the name and any comments about the specific profile you are creating.
PRTK and DNA can process encrypted files in the following languages:
By default, Lowercase Letters, Uppercase Letters, Digits, Symbols, and Diacritics are checked.
The character selections do not affect the dictionaries. Lowercase Letters: uses only lowercase letters to generate passwords. Uppercase Letters: uses only uppercase letters to generate passwords. Digits: Searches for numbers. Symbols (Standard): Searches for symbols from the keyboard, such as
the plus sign (+) or the dollar sign ($).
Diacritics: Searches for symbols, such as the tilde (~) or the circumflex
(^) combines with letters.
All 7-bit Characters (ASCII): Searches for any ASCII characters. This box
includes all characters listed above it.
All 8-bit Characters: Searches for any ASCII and Extended ASCII characters. This box includes all characters listed above it and the Extended ASCII characters. Dictionaries The following dictionaries are included in PRTK. Dictionaries end with the .ADF or .XML extensions. Each dictionary includes both a code page (c.ADF) and a Unicode (u.ADF) version. You can also create additional dictionaries from a forensic image. For example, you can create dictionaries from the word list from FTK. Rules The password Rules that PRTK applies to dictionaries. The Rules are run in the order you list.
To create a profile:
98
1. Select Edit > Profiles > New to create a new profile from a default template.
OR Select Edit > Profiles > New From Selected to use a selected profile as a template.
2. In the Name field, enter the name of the profile. Without a profile name, the profile
The dictionaries are checked by default according to the languages that you specify in Step 4. You can add more dictionaries that are relevant to your encrypted files. To aid in the selection process, click Select All or Deselect All.
7. Check the rules to include.
To change the order of a rule, select the rule; then click Move Up or Move Down. To aid in the selection process, click Select All or Deselect All.
8. Click Save > Yes. 9. The *.profile file will be saved to the %systemroot%\documentsandsettings\all
users\applicationdata\accessdata\PR\Profles\ folder.
EDITING A PROFILE
You can edit any of the information that you originally specified when you created a profile. You might edit a profile if you want to change the order of the password rules or to add another dictionary that you have recently created. Edit a profile on the Manage Profiles screen. To edit a profile:
1. Select Edit > Profiles. 2. In the Manage Profiles list, select the profile to edit and then click Edit. 3. Modify the desired options in the profile form. 4. Click OK, and then Close.
99
Note: You cannot change the name of the profile on this screen. If you enter a new profile name, then another profile with the same name as the profile that you are editing is added to the Manage Profiles list.
For more information about each option, see Creating a Profile on page 97.
DELETING A PROFILE
You may choose to delete a profile if you no longer need its specific collection of Rules and dictionaries. You can delete a profile on the Manage Profiles screen. To delete a profile:
1. Select Edit > Profiles. 2. In the Manage Profiles list, select the profile that you want to delete and then click
Delete.
3. Click Yes to confirm the deletion.
100
You can customize the password recovery rules that PRTK 6.5 and DNA 3.5 use in their file decryption. You can customize the rules either by creating a new rule or changing the rule order so that the time required to decrypt a file is decreased.
101
profile. Each rule has a prefix composed of a category, followed by an intensity, followed by an ID. For detailed information on rules, see Rules on page 196.
changed by the user. For a table listing the default rule order, see Default Rule Order on page 197.
permutations. The rules progress through the Golden Dictionary automatically, and subsequently all other selected dictionaries from the top of the list to the bottom. For a table that contains all password rules, see Appendix B Password Recovery Attacks on page 193. You can change the order of the password rules to increase the speed of password recovery. For example, if you know the password is in English and contains three characters, you can move the All Three-letter Language-specific Passwords Search rule to the top of the Rules list. You change the order of the password rules within a profile. You cannot automatically change the password rule order for all profiles. To change the password rule execution order for a profile:
102
103
2. Select the profile that you want to change, then click either New, New From Selected, or
Edit. To create a new profile using an existing profile as a template, be sure to change the name of the profile you are editing before you save it. Figure 7-1 Profile Editor
As you create or edit a profile, be sure to consider each of the following steps:
3. In the rules list, select the rule that you want to move, then click either Move Up or
Move Down. One click moves the rule one place. Click the button as many times as needed to set the rule order. You can move more than one rule, but only one at a time.
4. Mark the check box next to any rule(s) you wish to use; unmark the check box for
any rule(s) not to use. Because there are many rules, you can simplify this process by clicking Select All, and unmarking the ones you dont want, or by clicking Select None, then marking the ones you do want.
Note: The check marks tell the program which rules to use, not the execution order of the rules.
104
5. Click OK. The updated profile is saved and appears in the Manage Profiles List. 6. Click Close to close the Manage Profiles box. Note: If you change the properties of a profile, such as modifying the rule order, the new changes are not applied to current jobs in the PRTK system. The changes are applied only to new jobs that are added.
Use the Rule Editor to create or edit a rule. The types listed on the right side column of the Rule Editor are the building blocks for creating a rule. Types are different ways that
105
characters or words are permutated. Types and the information that you specify about the types are used to create rules. Figure 7-3
One rule can have multiple types. For example, you can create a rule that combines words created by two different types, as seen in the graphic above. In this example, the Lowercase type creates a lowercase word set of an English dictionary (enu.adf). The Romanize type uses the words in an Arabic dictionary (ar u.adf) to create a word set of Arabic words re-written with English letters. The Concatenate type then combines the two word sets created by the Lowercase and Romanize types to create a single word set.
Important: A word set is any series of words. Some word sets are stored in dictionaries, which are saved in (.ADF) files to your hard drive. Its available for use in multiple profiles and multiple sessions. Other words sets are not saved. For example, the Lowercase word set is generated by PRTK when the rule is applied, but the resulting word set is stored just in memory as the rule is being used.
106
Although you can combine types to create one rule, each type within the rule must ultimately point to a word set. The type uses the word set as its source to create a derivative word set. In the example above, the Lowercase type uses an English dictionary as its source of words. The type applies its function of displaying all letters in the dictionary in lowercase letters. It then creates a new word set of lowercase English words. The example above uses only English and Arabic dictionaries. However, you should generally create a user-defined rule that contains all dictionaries to increase the versatility of the user-defined rule. You can then specify the appropriate dictionaries in each profile. The available basic word sets are:
Characters Dictionary Markov Words (An exported word list from a forensic case, or from any other source) Golden Dictionary
Each word set and all available types can function either as sources or source modifiers. A source is a word set or dictionary from which PRTK and DNA draw words.
TABLE 7-1 Available Word Sources and Descriptions Source Character (source) Description A word set based on a fixed-length sequence of characters. The character word sets are created from the languages specified in the profile. For example, you have created a profile that only uses the Spanish language. If you create a user-defined rule that contains the Character type, the character word set consists of only Spanish characters. If you select the Character type, you must enter the desired number of characters in the appropriate field, and you must check the character groups that you want to include.
107
TABLE 7-1 Available Word Sources and Descriptions Source Dictionary (source) Description A word set that is associated with a language. The entire set is tagged as codepage or UTF16-LE. Typically, when you create a user-defined rule, you only select this type when you need to specify a word set. This type doesnt perform any permutations of characters or words. If you select this type, you must select the dictionary from the Dictionary drop-down list, or select that dictionary in the Profile. Generally you should create a user-defined rule that contains all dictionaries to increase the versatility of the user-defined rule. You can then specify the appropriate dictionaries in each profile. Markov (source) The word set uses statistical Markov methods to create words with phonemes that sound like English words; however, the words themselves are actually meaningless. This is the only type that uses the Threshold field. The threshold number determines how many times any combination of letters must appear in a database table of all English words. If the combination of letters meets the threshold, then the letters are used to create words in the word set. A high threshold generates a relatively small number of words. A low threshold generates a large number of words. Words (Source) Words to be used with the modifiers. Type each word, or copy and paste a list of words. Each word must be followed by a hard return so it is on its own line in the list. A word set that is not associated with a language and consists of previously discovered passwords. Each password is included in both code page and UTF16-LE. Typically, when you create a user-defined rule, you only select this type when you need to specify a word set. This type doesnt perform any permutations of characters or words.
108
TABLE 7-2 Available Modifiers and Descriptions Modifier Arabic on English Keyboard (modifier) Description Transforms Arabic words typed on an English keyboard into English words that might be passwords. The words are created according to the key location on the keyboard. For example, this type replaces the letter shin in Arabic with the letter a in English because they have the same location on a keyboard. The new English words are completely meaningless. If you select this type, you must create a subordinate Character, Dictionary, Golden Dictionary, or Markov type. Arabicize (modifier) Uses a word from any non-Arabic language and replaces the letters in the word with the corresponding letters in the Arabic alphabet; alif replaces a for example. If you select this type, you must create a modifier. Concatenate (modifier) Combines words from different word sets. This type takes one word from one word set and places it next to one word from another word set. For example, if one word set consists of dog and the other word set consists of cat, the Concatenate type creates dogcat and catdog. If you select this type, you must create two subordinate Character, Dictionary, Golden Dictionary, or Markov types. English on Arabic Keyboard (modifier) Transforms English words typed on an Arabic keyboard into Arabic words that might be passwords. The words are created according to the key location on the keyboard. For example, if youve memorized a password by keystroke, the password will be the same between different keyboards. English on Russian Keyboard (modifier) Transforms English words typed on an Russian keyboard into Russian words that might be passwords. The words are created according to the key location on the keyboard. For example, if youve memorized a password by keystroke, the password will be the same between different keyboards. Insert (modifier) Places each word of one word set into all possible positions for each word in another word set. For example, if the word set consists of dog and cat, the Insert type creates cdogat, cadogt, catdog, and so on. If you select this type, you must create a subordinate Character, Dictionary, Golden Dictionary, or Markov type.
109
TABLE 7-2 Available Modifiers and Descriptions Modifier Lowercase (modifier) Description Uses an existing word set to create another word set that is all lowercase letters. If you select this type, you must create a subordinate Character, Dictionary, Golden Dictionary, or Markov type. Multi-slot (modifier) Allows multiple passwords on one file. This type is only used for the DriveCrypt and DriveCrypt Plus Pack. If you select this type, you must create a subordinate Character, Dictionary, Golden Dictionary, or Markov type. Primary (modifier) Uses a word set and performs the following for each word in that set:
Lowercased Uppercased Lowercased with the first letter uppercased Uppercased with the first letter lowercased
If you select this type, you must create a subordinate Character, Dictionary, Golden Dictionary, or Markov type. Reverse (modifier) Uses a word set and reverses each word in the set. If you select this type, you must create a subordinate Character, Dictionary, Golden Dictionary, or Markov type. Romanize (modifier) Uses Arabic words and replaces letters according to the sounds of English letters. If you select this type, you must create a subordinate Character or Dictionary type. If you select the Character type, the profile must include the Arabic language. If you select the Dictionary type, you must select an Arabic dictionary. Russian on English Keyboard (modifier) Transforms Russian words typed on an English keyboard into English words that might be passwords. The words are created according to the key location on the keyboard. For example, if youve memorized a password by keystroke, the password will be the same between different keyboards. Secondary (modifier) Uses a word set to create another word set of both lower- and uppercased words. If you select this type, you must create a subordinate Character, Dictionary, Golden Dictionary, or Markov type.
110
TABLE 7-2 Available Modifiers and Descriptions Modifier Two Uppercase (modifier) Description Uses a word set and creates another word set that uppercases one and two letters at a time for each word. If you select this type, you must create a subordinate Character, Dictionary, Golden Dictionary, or Markov type.
111
The following table describes the Word Set options at the bottom of the Rule Editor form:
TABLE 7-3 Word Set Options and Descriptions
Option
Type Dictionary
Description
The basic unit of a user-defined rule. You can select multiple equal or subordinate types per rule. The available dictionaries. You only use this drop-down list when you select a Dictionary type. Generally you should create a user-defined rule that contains all dictionaries to increase the versatility of the user-defined rule. You can then specify the appropriate dictionaries in each profile.
The number of characters to include in a character word set. You only use this field when you select a Character or Markov type. The number of times a combination of letters must be found to include it in the Markov word set. You use this field only when you select the Markov type. The following are specific character groups to use in the Character word set:
Character Groups
All 7-bit Characters (ASCII): Searches for any ASCII characters. This box includes all characters listed above it.
Digits: Searches for numbers. Lowercase Letters: Searches for lowercase letters. Uppercase Letters: Searches for uppercase letters. Diacritics: Searches for diacritics, such as the tilde (~) or the
circumflex (^).
112
You might name the rule according to its function, such as Combine Arabic/ English words.
3. Build the rule using the Sources and Modifiers available. 4. Refine the rule based on the Sources and Modifiers selected. 5. To add an additional type at the root rule, select the rule name and then click Add. 6. To remove any type in the hierarchy, select the type in the Hierarchy window and
click Remove.
7. Click OK. Click Cancel if you do not want to save the information you entered on the
form.
click Edit.
3. Enter the new information in the Rule Editor form. 4. Click OK.
Click Cancel if you do not want to save the information you entered on the form.
113
114
PRTK 6.5 and DNA 3.5 use dictionaries to identify possible passwords. You can create, import, and browse the dictionaries. Note: After you create or import any dictionary, you must add the dictionary to a profile. For more information, see Editing a Profile on page 99.
DICTIONARY BASICS
PRTK and DNA use dictionaries to discover the passwords that decrypt files. The
dictionary attacks employ the default dictionaries included with the product as well user-defined biographical and other custom user dictionaries.
PRTK and DNA automatically store recovered passwords in a single file referred to as
the Golden Dictionary. This file contains all recovered passwords (in both code page and Unicode) from all PRTK jobs. The Golden Dictionary is automatically created after PRTK recovers its first successful password. Biographical dictionaries contain personal data, such as dates or phrases, significant to the person who created the password. Most passwords used with general applications contain some information about the person who locked the file. Therefore, creating a dictionary that contains personal data on the person in question increases the probability that you can recover the password. User dictionaries contain key phrases or words that are associated with the investigation but not with the person who locked a particular file.
Note: To create a user dictionary, enter one word per line in a standard text editor such as Notepad. Each term must be separated with a hard return.
115
PRTK and DNA support dictionaries in Arabic, English, French, German, Italian, Russian, and Spanish. All dictionaries for both programs are stored by default in
[drive]:\DocumentsandSettings\AllUsers\ApplicationData\ AccessData\PR\Dictionaries. During a dictionary attack, PRTK and DNA use the information in the selected profile to create variations, permutations, and combinations of the biographical and user dictionaries. Additionally, it uses phonetic alterations, adds prefixes or suffixes, and substitutes characters. By default, PRTK and DNA use the following dictionaries in this order:
1. The Golden Dictionary 2. Biographical dictionary/As-is dictionaries 3. Those specified in the profile
Tools.
4. Select which tool to use.
116
The following table lists tools can be accessed from the Dictionary Tools menu, and their functions. Each is covered in more detail in this chapter.
TABLE 8-1 Available Dictionary Tools
Tool
Dictionary Browser Dictionary Info
Function
Provides a way to view the words in each dictionary, or to delete a particular dictionary or dictionaries. Provides a way to see the specific details about a dictionary, such as the dictionary type, encoding, language, word count, and a description. Builds dictionaries of candidate (possible) passwords from a collection of biographical details and from combinations of the biographical data entered. Builds dictionaries from a phrase file and by using subphrases from the phrase file. Builds dictionaries from a wordlist file and by using permutations of words from the wordlist file.
Standard Dictionary Generator Builds custom dictionaries using a wordlist file. The Standard Dictionary Generator is the default window that appears in the AccessData Dictionary Import Utility Golden Dictionary Merge Merges two golden dictionaries into a single golden dictionary. It also converts golden dictionaries from PRTK 5 and DNA 2 into the current golden dictionary format.
When completed successfully, the dictionary tool generates both Code-page and a Unicode format dictionaries that you will find in the following directories:
DocumentsandSettings\AllUsers\ApplicationData\
AccessData\PR\Dictionaries
BROWSE DICTIONARIES
The Browse Dictionaries tool provides a way to view the contents of a dictionary, or to delete a dictionary. Use the mouse to select a dictionary file from the list of those found in the current directory.
When you select a dictionary, click View Entries to see a window containing a
scrollable list of the dictionaries entries.
Use the scroll bar to move up or down the list. When you select a dictionary and
click the Delete button, a confirmation dialog opens to make sure you really want to delete the file.
117
DICTIONARY INFORMATION
The Dictionary Information tool provides a way to view details about an AccessData dictionary. The interface is divided into two different areas: the Dictionaries list and navigation controls and the Details panel. The navigation controls allow you to navigate your hard disk to the dictionaries that you have. Selecting a dictionary in the navigator displays the details for that dictionary in the details panel below. The navigator window shows only dictionary files and directories. Each dictionary file entry shows the filename, type, word count, and the date the file was last modified. The Details Panel shows the following information:
TABLE 8-2 Detailed Dictionary Information
Information
Encoding
Description
Codepage indicates a standard 8-bit character encoding; UTF-16LE indicates a 16-bit little-endian encoding. Only these encodings are supported at this time. The special vocabulary and usages of a scientific, professional, or national group. The number of words the dictionary actually has as counted by the Dictionary info tool. An explanation of the selected dictionarys contents, if one was entered when the dictionary was created.
118
list file. Once a file has been selected, the remainder of the controls will become available. Figure 8-1 Generating a Standard Dictionary
A source word list is provided in a text file where each word is separated from the others by a hard return. You can use a phrase in place of a word since the tool does not try to separate the provided text, except at carriage returns. Under the dictionary settings the language for the dictionary as well as the type of characters that occur in the dictionary can be specified. By unchecking one of the character types, that character type will be filtered from the phrases added to the dictionary. The tool filters these character types:
TABLE 8-3 Dictionary Settings
119
When the dictionary generation is successfully completed, two dictionaries will have been created, one each for Unicode and Codepage encodings.
BIOGRAPHICAL DICTIONARY
The Biographical Dictionary tool creates dictionaries using personal data such as dates or phrases about the suspect.
120
Names, dates, phone numbers, and addresses Birthdays, anniversaries, or other significant dates Interests and hobbies Pets, celebrities, family Favorite books, movies, songs, poems Social Security Numbers
You can also glean valuable personal details for the biographical and user dictionaries by evaluating the physical evidence at an investigation site. Often the routine clues sticky notes, phone number lists, date books, electronic lists (perhaps in a file named passwords on a hard drive or floppy disk), entries on a Palm Pilot/Pocket PC, or even a file on a thumb drive or the Compact Flash card in a digital cameraoffer valuable information. Hiding places can range from the most ingenious to right out in plain sight. Be careful not to overlook the obvious. The following can provide valuable clues at a crime scene:
Books and magazines Photographs Calendars, day planners, and personal organizers Notes and mail, including e-mail Paraphernalia
In addition, reconstructing the alleged crime or using related evidence found at the scene can give the investigator clues which can be leveraged in the biographical dictionary. Additional clues can be observed by how the evidence interacts, how the suspect uses digital media, or how the times are related to evidence and events. To understand how evidence relates to the crime, the investigator must evaluate the geographic location of people and computers as well as any communication or transactions that occurred between them. For example, in a fraud investigation involving thousands of people and computers, understanding where each party was
121
located and how they interacted can reveal important information about the biography of the criminal. Sorting the financial transactions of individuals or organizations can also reveal patterns of behavior. By observing the evidence at a scene and reconstructing the actions performed by the subject, you can create a more effective word list to be used in generating the biographical dictionary. Figure 8-2 Using the Biographical Data Tab
You can enter words or numbers in the Word field, such as the name of the individual that you are creating the dictionary about and the birthdate. The Data drop-down menu lists the following types of personal information:
TABLE 8-5
Any combination and arrangement of the information you can think of will make your biographical dictionary more effective. Make every guess you can at a subjects password, and enter as many versions of the guess as you can.
122
You can use a variety of different formats to enter numeric information, such as phone number and date. For example, you can enter a phone number as 111.222.3334 or 111 2223334. Enter as many different formats as you can think of. To create a biographical dictionary:
1. Select Tools > Dictionary Tools > Dictionary Tools > Biographical Dictionary Generator. 2. Click the Biographical Data tab. 3. In the Data drop-down list, select the type of personal data to enter. 4. Type the personal data into the Word field, then click Add, or press Enter.
To remove a word and its type from the Word list, select the word and click the Remove button.
5. Click the Generator tab to create a dictionary based on the Word list, then specify your
dictionary, click Generate, and enter the name of the biographical dictionary. Figure 8-3 Using the Biographical Dictionary Generator Tab
123
The biographical dictionary is automatically added to the list of dictionaries in PRTK in codepage (c), Unicode (u), and as-is (xml) formats.
3. Make your Dictionary Settings and Phrase Settings selections based on the
your dictionary.
124
Use the Dictionary Settings to specify the language and character types to use in generating this dictionary, according to the information in the following table:
TABLE 8-6 Dictionary Settings
Dictionary Settings
Language Include
Description
Choose from thirty languages that PRTK/DNA has dictionaries for, according to what will produce the most likely useful results. Check to Include, or uncheck to exclude the following character types to be included in the Pass-Phrase: Letters: Alphabetic characters used to compose words. These include letters with diacritic marks and any other type of composed character used to construct words. Digits: Numeral characters (09). Symbols: Symbol characters. These include punctuation and non-alpha or digit characters, but do not include the diacritic marks used for composed characters. Diacritics: The special characters used in composed characters. If letters are included but diacritics are not, then the base letter will be preserved.
Use the Phrase Settings to narrow or broaden your pass-phrase dictionary contents as described in the following table:
TABLE 8-7 Phrase Settings Setting Phrase Composition Description Specify the maximum number of consecutive words to use for each generated phrase. If the requested number of words is more than the total number of words in the source phrase, then the entire source phrase will be used. For each phrase in the list, Generate Specify the number of characters to include in each phrase. This is deactivated by default. If checked, you can specify the maximum length of the phrase in characters. The generated phrase will be truncated to the specified length regardless of the resulting number of words that will remain in the generated phrase. Normalize Text Sort entries & remove duplicates Standardizes all words in lowercase format. Sorts all entries in the word list and removes duplicates to minimize search time.
125
4. Make your selections from the available Dictionary and Word settings, according to
This tool provides a way to create dictionaries of the various permutations, or ordered combinations of a source list of words. If you have a source word list file, you can enter the full path or browse to the file. Once a file has been selected, the remainder of the controls will become available.
126
Dictionary Settings
Language Include Letters
Description
Choose from thirty languages that PRTK/DNA has dictionaries for, according to what will produce the most likely useful results. Check to Include, or uncheck to exclude the following character types to be included in the Pass-Phrase Alphabetic characters used to compose words. These include letters with diacritic marks and any other type of composed character used to construct words. Numeral characters (09). Symbol characters. These include punctuation and non-alpha or digit characters, but do not include the diacritic marks used for composed characters. The special characters used in composed characters. If letters are included but diacritics are not, then the base letter will be preserved.
Digits Symbols
Diacritics
You can use a phrase in place of a word since the tool does not try to separate the provided text, except at carriage returns. In a source word list each word is separated from the next by a hard return in a text file saved in UTF-8 or Unicode format. You can specify the language for the dictionary as well as the type of characters that occur in the dictionary under the dictionary settings. By unchecking one of the character types, that character type will be filtered from the phrases added to the dictionary. Use the Word Settings to narrow or broaden your permutation dictionary contents as described in the following table:
TABLE 8-9 Word Settings Setting Permutation Composition Description Specify the maximum number of consecutive words to use for each generated phrase. If the requested number of words is more than the total number of words in the source phrase, then the entire source phrase will be used.
127
TABLE 8-9 Word Settings Setting Restrict Length Description Specify the number of characters to include in each phrase. This is deactivated by default. If checked, you can specify the maximum length of the phrase in characters. The generated phrase will be truncated to the specified length regardless of the resulting number of words that will remain in the generated phrase. Normalize Text Sort entries & remove duplicates Standardizes all words in lowercase format. Sorts all entries in the word list and removes duplicates to minimize search time.
Passwords Merged: the number of passwords added from the source dictionary to
the target dictionary to create the new golden dictionary
Note: The Merge Golden Dictionary tool does not add duplicate passwords to the new dictionary.
Total Passwords: the number of passwords contained in the new golden dictionary.
128
This chapter reviews the steps required to perform specialized password recoveries using PRTK 6.5, and DNA 3.5.
in the SAM file and System file found in the following directory: [drive]:\Windows_directory\system32\config\ Windows locks the SAM file and system file, so they cannot be directly accessed through the operating system. Use FTK Imager to access these files.
If you are using FTK Imager, export the SAM file and system file.
FTK Imager bypasses the Windows operating system, allowing you to copy the
Windows-locked files. The only potential problem is that if the SAM file and system file are being written to during the copy operation, you may get a corrupted copy. For instructions on using FTK Imager to obtain the necessary files, see Recovering Login Passwords on Windows 2000 and XP Systems on page 133.
If you have an image, extract the SAM file and the System file from the
[drive]:\Windows_directory\system32\config\ directory and save them to a
129
temporary folder on the password recovery hard drive. Follow steps 7 and 8 under Recovering Login Passwords on Windows 2000 and XP Systems on page 133.
If you are not using FTK Imager or if you do not have an image, boot your computer
from a boot disk and copy the SAM file and the System file from the system drive. For more information on how to obtain the necessary files using a boot disk, see Recovering Passwords Using a Boot Disk to Access the Files on page 133.
The Add Job Wizard (Page 1 of 2) opens. Select the Profile, worker Group(s), Priority Group, and Timeout After settings to use for this job.
130
4. Click Next.
5. In the Add Job Wizard (Page 2 of 2), under Module Options, click in the check
boxes under each users name, next to the attack types you wish to run for each user. Unmark the check boxes for jobs listed under users whose information you do not need. Below the attack types box you will see a Browse button next to a box that should be filled with the path and filename for the System or the Startkey file that matches the user and the system the SAM file is from.
131
6. Click Browse to automatically open the same folder the SAM file was added from. 7. Select the appropriateSystem file or syskey file, then click Open. 8. The startkey field in the Add 9. Click Finish. 10. PRTK and DNA analyze the SAM file and Systemfile and recover the login
Job Wizard (Page 2 of 2) should now be populated with the correct information.
password. Since there can be multiple users in the SAM file and the Systemfile, each with a unique password, multiple SAM file jobs may be added to the job list once for each user found and selected and each attack type chosen for each user selected.
Mapped drive passwords Dial-up networking passwords Secure website login passwords Important: PRTK and DNA do not run on Windows 9.x systems. You cannot recover PWL files directly from their native environment. You must copy them to a Windows XP, 2003 or Vista system.
A separate PWL file exists for each user on the current system. The actual filename is an 8.3 derivative of the users login name (for example, roy.pwl or elizabet.pwl). To determine the users login name, check the system.ini folder in the Windows directory. The system.inifolder lists the login names of every user on the current system. After you have determined the users login name, you can drag and drop the PWL file into the PRTK or DNA Job List pane. When PRTK or DNA attempts to recover the passwords in the PWL file, it prompts you for the users login name. PRTK or DNA then retrieves the passwords within the file.
132
Important: If the syskey is stored in the System registry file, it cannot be directly accessed because, like the SAM file and System files, Windows keeps it locked. Otherwise, the syskey could be stored on a floppy disk.
To extract the SAM file and the Systemfile from a live system that is not your PRTK or DNA password recovery system, do the following:
1. Install FTK Imager on the local hard drive, or copy the files from a system where it
is installed to a thumb drive and connect that to the live system you want to extract the SAM file and the Systemfile from.
2. Run FTK Imager. 3. In the toolbar, click the Obtain Protected Files button 4. Under Options, choose either Minimum files for login password recovery, or Password
If you have a thumb drive, a portable drive, or a network directory available, save the files to a new folder there so you can take them to the system where you will be doing the password recovery.
6. Click OK to close the dialog and run the extraction. When complete, close FTK
Imager.
7. Connect the portable drive to the recover system, and copy the files to the hard drive where PRTK or DNA is running.
For information on processing the extracted or collected files, see Processing the Protected System Files in PRTK or DNA on page 134.
133
1. Restart the computer with a boot disk that is able to read your system drive.
If the system drive is a FAT partition, you can use a Windows 98 boot disk. If the system drive is an NTFS partition, you must use a Linux or NTFSDOS boot disk.
2. After booting to the boot disk, go to the
[drive]:\Windows_directory\System32\config\ directory.
3. Copy the SAM file and System file to another location, such as a floppy disk or a
network directory.
4. Restart the computer normally.
the SAM file, and your recovery is running on the same machine as the source files, will be read and referenced automatically. If the Protected System Files have been obtained from another machine, add the SAM file, and you will be prompted on the second page of the Add Job Wizard for the location of the System file; it does not need to be added as a separate job.
134
3. Click Browse to specify the location of the System or the startkey.key file.
If the System file is on a hard drive or a network drive, browse to and select the
System file to add it to the Available Attacks For This File dialog.
135
Outlook and Outlook Express passwords Internet Explorer text fields, such as passwords, emails, and user names submitted
online in text fields The following table identifies the registry files required to recover these passwords on each operating system:
TABLE 9-1 Required Registry Files According to Operating System Operating System Windows NT/2000/XP Windows 9.x system with one configured user Windows 9.x systems with multiple configured users File [drive]:\DocumentsandSettings\user\ntuser.dat [drive]:\Windows_directory\System [drive]:\Windows_directory\Profiles\user\user.dat
Unfortunately, Windows locks these registry files; therefore, they cannot be directly accessed through the operating system. To access these files, you must do one of the following:
136
If you have an image, extract the file from the file directory.
If you are not using FTK Imager or if you do not have an image, boot your computer from a boot disk and copy the file from the system drive. To boot your computer from a boot disk and copy the ntuser.dat or user.dat file:
1. Restart the computer with a boot disk that is able to read your system drive.
If the system drive is a FAT partition, you can use a Windows 98 boot disk. If the system drive is an NTFS partition, you must use a Linux or NTFSDOS boot disk.
2. After booting to the boot disk, go to the associated file directory. 3. Copy the file to another location, such as a thumb drive or a network directory. 4. Restart the computer normally.
After you obtain the ntuser.dat, System, or user.dat file, you can perform the password recovery as follows:
1. Start the recovery job. In PRTK or DNA, select File > Add Files and then select the file, or drag and drop the file into the PRTK or DNA Window. 2. Specify the module options. 3. Select the profile to use. PRTK and DNA analyze the file and recover the Outlook or Outlook Express password and the Internet Explorer text fields.
to decrypt the .pref files are contained in the keyS.dbfile, which is protected by the master password. To recover these passwords, PRTK and DNA do a dictionary attack on the keyS.db file. After the master password is recovered, the .pref files can be decrypted. To recover an AOL Communicator Account Password, first recover the master password from keyS.db in [drive]:\DocumentsandSettings\username\Application
137
To access the protected storage area of the registry, see Recovering Passwords from the Registry Protected Storage Area on page 136.
2. Add the ntuser.dat file to the PRTK or DNA job queue.
If you are running PRTK or DNA on the original computer, the serial number is
automatically found.
If you are using FTK Imager, you can find the serial number in the Properties
window. Once you know the volume serial number, enter it in the Module Options dialog in PRTK or DNA.
operating system.
138
Note: To recover an MSN Messenger Login password, the user must have selected the Remember Password option for the system to store this information.
WINDOWS 95/98/ME
On Windows 95/98/Me systems, the password is obscured in the registry.
Important: PRTK and DNA do not run on Windows 9.x systems. Therefore, you cannot recover these passwords in their native environment. You must copy them to a Windows 2000, XP, or Vista system.
To recover an MSN Messenger Login password:
1. Obtain the users ntuser.dat file.
To access the protected storage area of the registry, see Recovering Passwords from the Registry Protected Storage Area on page 136.
2. Copy the file to a machine running PRTK or DNA. 3. Add the ntuser.dat file to the job queue.
WINDOWS 2000
On Windows 2000 systems, the password is encrypted in the registry. Before the password can be decrypted, the EFS master key files must be cracked. To recover an MSN Messenger Login Password:
1. Recover the Windows login password from the SAM file and Systemfile. 2. Copy the EFS master key files from [drive]:\DocumentsandSettings\ username\ApplicationData\Microsoft\Protect\user_SID. 3. Add thentuser.dat file to the job queue. Note: When using FTK 2.x in conjunction with PRTK or DNA, you must export the EFS master key file, along with any other EFS-related keys from the FTK case and add them as jobs in either PRTK or DNA. PRTK or DNA then performs an EFS attack to obtain the login password. Since FTK2.x and either PRTK or DNA should not be installed on the same machine, exporting the files and moving them to the PRTK or DNA Supervisor machine is the only way to accomplish EFS file decryption. Further, when running FTK 1.x, there is an option to do an Advanced EFS attack. Use this option with either PRTK or DNA installed on the same machine with FTK 1.x, and FTK will transfer the files to PRTK or DNA automatically. The FTK and the PRTK or DNA programs must use the same dongle on the same machine to support this integrated functionality.
139
WINDOWS XP
On Windows XP systems, the password is encrypted in the user's credential file. The credential file cannot be decrypted until the EFS master key files are cracked. To recover an MSN Messenger Login Password:
1. Recover the Windows login password from the SAM file and System file. 2. Copy the EFS master key files from [drive]:\DocumentsandSettings\
username\ApplicationData\Microsoft\Protect\user_SID.
3. Perform the password recovery on the credential file in [drive]:\Documentsand
Settings\[username]\ApplicationData\Microsoft\Credentials\ [user_SID]\Credentials.
Note: When used in conjunction with PRTK or DNA, FTK sends PRTK or DNA the EFS master key file, along with any other EFS-related keys. The EFS attack is then performed to obtain the login password. FTK and PRTK or DNA must be running on the same dongle on the same machine to support this integrated functionality.
140
To access the protected storage area of the registry, see Recovering Passwords from the Registry Protected Storage Area on page 136.
2. Perform the password recovery. Note: You can use FTK to recover Yahoo! Messenger chat logs.
The WinZip Superfast Attack is not a standard key space attack. It breaks the key space down much more quickly than a linear key space because it intelligently narrows down the zip keys, effectively processing a trillion keys per second. After the WinZip Superfast Attack recovers the zip keys, it attempts to recover the original password by performing a dictionary attack of passwords up to seven characters. If Decrypt file when key is found is marked in the Preferences dialog, PRTK and DNA decrypt the file using the zip key. The program then saves the file as [filename]Recovered.zip in the directory designated in the Preferences dialog. The recovered file can be opened without a password. However, if the files contained in the.zip file are passworded or otherwise encrypted, they must be added to PRTK or DNA as additional, separate jobs. For more information on configuring the PRTK or DNA decryption options, see Specifying Recovery Preferences on page 77.
141
If you have questions about the different components of this recovery, see Component Details on page 144.
[Drive]:\DocumentsandSettings\[username]\ApplicationData\ Microsoft\Protect in such a way that the contents of the Protect folder will be available in their entirety.
2. Registry files for the system
[Drive]\DocumentsandSettings\[Username]\LocalSettings\History\ History.IE5\index.dat
4. Protect folder: Run a recursive export from:
[Drive]\DocumentsandSettings\[Username]\Roaming\Microsoft\Protect folder.
5. IE7 Internet Browsing History of URLs Index.dat 6. Find the file in
[Drive]\DocumentsandSettings\[username]\LocalSettings\Microsoft\ Windows\History\Low\
7. Output.txt Choose a location for, and create a blank output text file by this name.
142
[Drive]:\Users\[UserName]\AppData\Roaming\Microsoft\Protect in such a way that the contents of the Protect folder will be available in their entirety)
2. Vista Registry Hives
Drive]:\Users\[Username]\AppData\Local\Microsoft\Windows\History\
Low\History.IE5\index.dat
STEPS TO COMPLETE
Use the following steps to use PRTK or DNA to decrypt data protected by DPAPI:
1. Drop the NTUSER.dat into PRTK/DNA. 2. When the attack module is identified, it should recognize that the protected storage
The Windows login password (If you do not know the users password you will
need to recover the password using the SAM and SYSTEM registry files exported in Collecting Necessary IE7 Files on page 142 (For more information see Recovering Login Passwords on Windows 2000 and XP Systems on page 133). In the case that the users password is blank, you can just leave the password field blank.
The folder named with the users SID that contains the master key files. The index.dat from the browsing history. Output file: If no path is provided, the file will be saved to
%SystemRoot%\ProgramFiles\AccessData\PRTK6orDNA3
143
3. With all the fields completed out correctly (see below screen shot) PRTK/DNA
should be able to display the protected data stored for each URL provided when you examine the defined output file.
The above screen shot assumes you exported the files mentioned in Collecting Necessary IE7 Files on page 142, to C:\Export\. This serves as an example of what you would see if you correctly fill in the fields of the IE7 Autocomplete Data decryption module.
4. When all fields are populated, click OK.
COMPONENT DETAILS
If you have questions about the items referenced above, this section gives an explanation of each.
IE 7
Since IE 7 auto-complete data is encrypted with the Data Protection API, the user must supply the module with the corresponding windows password, Master key file, and SID.
144
The auto-complete data also has another layer of protection: each piece of data is additionally encrypted with its corresponding URL string. This means that the user must also supply the module with a file that contains the URLs of each piece of autocomplete data. The module uses regular expressions to find URLs in this file, so it doesn't need to have any particular format. A very good choice for this file is the index.dat file, since it usually contains the users IE browsing history: %SystemRoot%\DocumentsandSettings\%Username%\LocalSettings\History\ History.IE5\index.dat
145
To access that data, Internet Explorer, or another capable application, calls upon the CryptUnprotectData function, which creates a recovery key, from the master key, to seamlessly decrypt the stored data. The encryption/decryption processes must be performed while either the owner of the encrypted data is logged in, or by accessing the collective components used in the encryption process. As a result, the DPAPI protects sensitive data while the computer is turned off, and from other users who are logged into the same computer.
The Master Key files corresponding to a user are usually found in the following
directory: %SystemRoot%\DocumentsandSettings\{username}\Application Data\Microsoft\Protect\S1521
The Master Key files themselves have names that look like:
f1cc77efef764c89838520b9a921d2c6
By default Windows marks these as hidden system files which means that you cannot
see them unless you specifically enable Windows Explorer to show those types of files.
SID
Windows assigns a Security ID to each user in a system or domain.
The SID is used in the Data Protection API as salt in the encryption of the Master
key files with the Windows login password. That is why the SID is needed to decrypt data that has been encrypted with the Data Protection API.
The name of the folder that contains the Master key files is usually the SID.
146
This chapter acquaints you with the managing AccessData product licenses. Here you will find details regarding the LicenseManager interface and how to manage licenses and update products using LicenseManager.
NLS SUPPORT
In this PRTK 6.5 and DNA 3.5 release, AccessDatas Network License Service (NLS) is supported. If you have NLS, you should also have documentation on how to install and implement it.
VIRTUAL CMSTICK
Beginning with the PRTK 6.5 and DNA 3.5 release, AccessDatas new Virtual CmStick is supported. The Virtual CmStick is a file that allows full use of the program without worry that the USB CmStick could be lost or stolen. Licenses can be bound and unbound to the Virtual CmStick just as with the USB CmStick, however, the Virtual CmStick is not transferable from one machine to another. (15228) Talk to your Sales Representative about purchasing this option.
147
The Wibu CodeMeter Runtime software with a Wibu CodeMeter (CmStick) The Wibu CodeMeter Runtime software, and the AccessData Dongle Drivers with a
Keylok dongle
Note: The Codemeter Runtime software and either a silver Wibu CmStick or a green Keylok dongle are required to run PRTK or DNA. Without them, you can run PRTK or DNA in Demo mode only.
The CmStick or dongle should be stored in a secure location when not in use. You can install PRTK and the CodeMeter software from the shipping CD or from downloadable files available on the AccessData website at www.accessdata.com. Click Support > Downloads, and browse to the product to download. Click the download link and save the file locally prior to running the installation files. For solutions to commonly asked installation questions, see Chapter 11 Troubleshooting on page 173.
148
Find CodeMeter Runtime 4.10c (64-bit) MD5: fa7a268bbbf4db75cdc52333ca663d11 (MD5 hash applies only to this version)
3. Click the Download link. 4. Save the file to your PC and run after the download is complete.
When the download is complete, double-click on the CodeMeterRuntime323.30.exe. RUNNING THE CODEMETER RUNTIME SETUP Whichever way you choose to access the CodeMeter Runtime setup file, when you run it you will see the following:
1. The CodeMeter Runtime Open File Security Warning will appear to allow you to
149
2. Click Run.
150
5. Click Next.
6. In the User Information screen, enter your name and your company name. 7. Specify whether this application should be available only when you log in, or for
151
11. When you are satisfied with the options you have selected, click Next.
12. Installation will run its course. When complete, you will see the CodeMeter
Runtime Kit v3.30 has been successfully installed screen. Click Finish to exit the installation. THE CODEMETER CONTROL CENTER When the CodeMeter Runtime installation is complete, the CodeMeter Control Center pops up. This is a great time to connect the CmStick and verify that the device is recognized and is Enabled. Once verified, you can close the control center and run your AccessData product(s). For the most part there is nothing you need to do with this control center, and you need make no changes using this tool with very few exceptions. If you have problems
152
with your CmStick, contact AccessData Support and an agent will walk you through any troubleshooting steps that may need to be performed.
Drivers. If auto-run is not enabled, select Start > Run. Browse to the CD-ROM drive and select Autorun.exe. OR
1. If installing from a file downloaded from the AccessData Web site, locate the
2. Click Next.
153
3. Select the type of dongle to install the drivers for. 4. Click Next.
5. If you have a USB dongle, verify that it is not connected. 6. Click Next.
7. Click Finish. 8. Connect the USB dongle. Wait for the Windows Found New Hardware wizard, and
Important: If the Windows Found New Hardware wizard appears, complete the wizard. Do not close without completing, or the dongle driver will not be installed.
WINDOWS FOUND NEW HARDWARE WIZARD When you connect the dongle after installing the dongle drivers, you should wait for the Windows Found New Hardware Wizard to come up. It is not uncommon for users to disregard this wizard, and then find that the dongle is not recognized and their AccessData software will not run. When the Found New Hardware Wizard pops up, do the following:
154
2. Click Next. 3. When prompted whether to install the software automatically or to install from a list
4. Click Next.
155
Once you have installed the dongle drivers and connected the dongle and verified that Windows recognizes it, you can use LicenseManager to manage product licenses.
INSTALLING LICENSEMANAGER
LicenseManager lets you manage product and license subscriptions using a security device or device packet file. For more information, see Chapter 10 Managing Security Devices and Licenses on page 147.
Note: You can install LicenseManager from the PRTK or DNA installation disc, or the installation files are available on the AccessData Website.
http://www.accessdata.com/downloads.htm.
2. On the download page, click the LicenseManager Download link. 3. Save the installation file (currentlylmlicense_manager2.2.4.exe) to a temporary
156
157
Run LicenseManager.
Run LicenseManager later by selecting Start >Programs > AccessData > LicenseManager > LicenseManager or by double-clicking the LicenseManager icon on your desktop
158
LicenseManager provides information as displayed in the following figures: Figure 10-1 LicenseManager Installed Components Tab
159
STARTING LICENSEMANAGER
LicenseManager.exe is located in C:\ProgramFiles\AccessData\Common Files\AccessDataLicenseManager\. You can execute the program from this location if you wish. Click Start > All Programs > AccessData > LicenseManager > LicenseManager, OR Click or double-click (depending on your Windows settings) the LicenseManager icon on your desktop OR From some AccessData programs, you can run LicenseManager from the Tools > Other Applications menu. This option is not available in PRTK or DNA. The LicenseManager program opens. .
160
When starting LicenseManager, License Manager reads licensing and subscription information from the installed and connected Wibu CodeMeter Stick, or Keylok dongle. If using a Keylok dongle, and LicenseManager either does not open or displays the message, Device Not Found, do the following:
1. Make sure the correct dongle driver is installed on your computer. 2. With the dongle connected, check in Windows Device Manager to make sure the
device is recognized. If it has an error indicator, right click on the device and choose Uninstall.
3. Remove the dongle after the device has been uninstalled. 4. Reboot your computer. 5. After the reboot is complete, and all startup processes have finished running,
right dongle drivers installed, do not browse the internet, choose, No, not this time.
7. Click Next to continue. 8. On the next options screen, choose, Install the software automatically
(Recommended)
9. Click Next to continue. 10. When the installation of the dongle device is complete, click Finish to close the
wizard.
11. You still need the CodeMeter software installed, but will not need a CodeMeter
Stick to run LicenseManager. If using a CodeMeter Stick, and LicenseManager either does not open or displays the message, Device Not Found, do the following:
1. Make sure the CodeMeter Runtime 3.30a software is installed. It is available at
www.accessdata.com/support. Click Downloads and browse to the product. Click on the download link. You can Run the product from the Website, or Save the file locally and run it from your PC. Once the CodeMeter Runtime software is installed and running, you will see a gray icon in your system tray: .
2. Make sure the CodeMeter Stick is connected to the USB port. When the CmStick is
then connected, you will see the icon change to look like this:
161
If the CodeMeter Stick is not connected, LicenseManager still lets you to manage licenses using a security device packet file if you have exported and saved the file previously. To open LicenseManager without a CodeMeter Stick installed:
1. Click Tools > LicenseManager.
162
The following buttons provide additional functionality from the Installed Components tab:
TABLE 10-2 LicenseManager Installed Components Buttons Button Help Install Newest Function Opens the LicenseManager Help web page. Installs the newest version of the programs checked in the product window, if that program is available for download. You can also get the latest versions from our website using your Internet browser. Updates the latest version information for your installed products. Displays the About LicenseManager screen. Provides version, copyright, and trademark information for LicenseManager. Closes LicenseManager.
Use the Installed Components tab to manage your AccessData products and stay up to date on new releases.
163
None: the product license is not currently owned Days Left: displays when less than 31 days remain on the
license.
164
TABLE 10-3 LicenseManager Licenses Tab Features Column Name Value Show Unlicensed Description Shows the name of additional parameters or information a product requires for its license. Shows the values of additional parameters or information a product contained in or required for its license. When checked, the License window displays all products, whether licensed or not.
The following license management actions can be performed using buttons found on the License tab:
TABLE 10-4 License Management Options Button Remove License Function Removes a selected license from the Licenses window and from the CodeMeter Stick or dongle. Opens the AccessData License Server web page to confirm success. Connects to the AccessData License Server. Downloads and overwrites the info on the CodeMeter Stick or dongle with the latest information on the server. Begins or restarts the service to read the licenses stored on the CodeMeter Stick or dongle. Click to stop the program reading the dongle attached to your machine, much like Windows Safely Remove Hardware feature. Click this button before removing a dongle. This option is disabled for the CodeMeter Stick. Open Packet File Save to File Opens Windows Explorer, allowing you to navigate to a .PKT file containing your license information. Opens Windows Explorer, allowing you to save a .PKT file containing your license information. The default location is My Documents. Finishes the removal of licenses in the unbound state. Licenses must be unbound from the CmStick or dongle before this button takes effect. Displays an HTML page with your CodeMeter Stick number and other license information. Allows you to bind an existing unbound license to your CodeMeter Stick, through an internet connection to the AccessData License Server.
Refresh Device
Finalize Removal
165
TABLE 10-4 License Management Options Button Purchase License About Done Function Brings up the AccessData product page from which you can learn more about AccessData products. Displays the About LicenseManager screen. Provides version, copyright, and trademark information for LicenseManager. Closes LicenseManager.
166
Save.
Note: In general, the best place to save the .PKTfiles is in the AccessData LicenseManager folder. The default path isC:\ProgramFiles\AccessData\CommonFiles\AccessData
LicenseManager\.
REMOVE A LICENSE
To remove (unbind) a product license:
1. From the Licenses tab, mark the program license to remove. This action activates
167
4. You will see some screens indicating the connection and activity on the License
Server, and when the license removal is complete, you will see the following screen: Figure 10-6 Packet Update Successful
5. Click OK to close the message box. You will then see an Internet browser screen
from LicenseManager with a message that says, The removal of your license(s) from Security Device was successful! You may close this box at any time.
ADD A LICENSE
To add a new or released license:
1. From the Licenses tab, under Browser Options, click Add Existing License.
The AccessData LicenseManager Web page opens, listing the licenses currently bound to the connected security device, and below that list, you will see the licenses that currently are not bound to any security device. Mark the box in the Bind column for the product you wish to add to the connected device, then click Submit.
2. An AccessData LicenseManager Web page will open, displaying the following
message, The AccessData product(s) that you selected has been bound to the record for Security Device nnnnnnn within the Security Device Database. Please run LicenseManagers Refresh Device feature in order to complete the process of binding these product license(s) to this Security Device. You may close this window at any time. Click Yes if LicenseManager prompts, Were you able to associate a new product with this device?
168
If you cannot connect to the Internet, the easiest way to move licenses from one dongle to another is to physically move the dongle to a computer with an Internet connection, add or remove product licenses as necessary using LicenseManager, and then physically move the dongle back to the original computer. However, if you cannot move the dongledue to organization policies or a need for forensic soundnessthen transfer the packet files and update files remotely.
information.
1c. Click Save to File to save the dongle packet file to the local machine. 2. Copy the dongle packet file to a computer with an Internet connection. 3. On the computer with an Internet connection: 3a. Remove any attached security device. 3b. Launch LicenseManager. You will see a notification, No security device
found.
3c. Click OK. 3d. An Open dialog box will display. Highlight the .PKT file, and click Open. 3e. Click on the Licenses tab. 3f. Click Add Existing License. 3g. Complete the process to add a product license on the Website page. 3h. Click Yes when the LicenseManager prompts, Were you able to associate a new
dongle does not match the serial number in the dongle packet file, you are prompted to save the update file, [serial#].wibuCmRaU.
3j. Save the update file to the local machine. 4. After the update file is downloaded, copy the update file to the computer where the
dongle resides:
5. On the computer where the dongle resides: 5a. Run the update file by double-clicking it. (It is an executable file.) 5b. After an update file downloads and installs, click OK.
169
5c. Run LicenseManager. 5d. From the Licenses tab, click Reload from Device to verify the product license has
information.
1c. Click Save to File to save the dongle packet file to the local machine. 2. Copy the file to a computer with an Internet connection. 3. On the computer with an Internet connection: 3a. Launch LicenseManager. You will see a notification, No security device found. 3b. Click OK. 3c. An Open dialog box will display. Highlight the .pkt file, and click Open. 3d. Click on the Licenses tab. 3e. Mark the box for the product license you want to unbind; then click Remove
License.
3f. When prompted to confirm the removal of the selected license from the dongle,
click Yes. When LicenseManager does not detect a dongle or the serial number of the dongle does not match the serial number in the dongle packet file, you are prompted save the update file.
3g. Click Yes to save the update file to the local computer.
The Step 1 of 2 dialog details how to use the dongle packet file to remove the license from a dongle on another computer.
3h. Save the update file to the local machine. 4. After the update file is downloaded, copy the update file to the computer where the
dongle resides.
5. On the computer where the dongle resides: 5a. Run the update file by double-clicking it. This runs the executable update file
170
5c. On the Licenses tab, click Reload from Device in LicenseManager to read the
security device and allow you to verify the product license is removed from the dongle.
5d. Click Save to File to save the updated dongle packet file to the local machine. 6. Copy the file to a computer with an Internet connection.
UPDATING PRODUCTS
You can use LicenseManager to check for product updates and download the latest product versions. For more information on the general features of the subscription service, see the AccessData Website at http://www.accessdata.com/subscription_renewal.htm.
Installed Components tab. Click Newest to refresh the list showing the latest releases, then compare your installed version to the latest release. If the latest release is newer than your installed version, you may be able to install the latest release from our Website.
2. Ensure that the program you want to install is not running. 3. Mark the box next to the program you want to download; then click Install Newest. 4. When prompted, click Yes to download and install the latest install version of the
product.
171
5. If installing the update on a remote computer, copy the product update file to
another computer.
6. Install the product update.
For information about installing the product update, refer to the installation information for the product. You may need to restart your computer after the update is installed.
support@accessdata.com.
172
Chapter 11 Troubleshooting
This chapter explains basic troubleshooting for Password Recovery Toolkit (PRTK) 6.5 and Distributed Network Attack (DNA) 3.5.
Chapter 11 Troubleshooting
173
INSTALLATION
This section contains solutions to common PRTK installation and upgrade issues and questions.
TABLE 11-1 Installation Troubleshooting
Problem
Possible Cause
Solution
If you do not install the dongle driver correctly, then the product displays A
I installed PRTK on a new Dongle isnt machine, and my dongle is installed properly. not working.
dongle was not detected. PRTK is now running in DEMO Mode. You will be able to run only jobs with the free modules message at startup.
To make sure you installed the driver correctly, check the following:
Make sure the dongle security hardware is plugged in to the correct port during installation of the dongle driver.
174
PASSWORD RECOVERY
This section contains solutions to the most common PRTK password recovery issues and questions.
TABLE 11-2 Password Recovery Troubleshooting
Problem
When I try to recover a password-protected file, PRTK returns the message Finished. Password not found What should I do now?
I know that my Excel/Word password is made up of all letters or all numbers. Can this information help me recover my password more quickly?
Why cant I recover my Zip file? Attack needs more The program uses SuperFast Zip time. Attack if your archive contains five or more files and was created with WinZip 8.0 or an earlier version. This attack generally takes around 2 to 3 hours. Why dont the Quicken 2002, QuickBooks 2002, WinZip, or VBA files appear in the clipboard after I recover the password?
PRTK has been running a dictionary attack for a very long time. Is this normal?
You did not You can access the decrypted recover the version of your file at the location password for these you specified when setting up. files; instead, you decrypted the file using the key. Yes. Double-click the file in PRTK to see the progress. If the number of passwords tested is still increasing, then the recovery is still running.
Chapter 11 Troubleshooting
175
Problem
If my computer crashes during a lengthy password recovery, how do I recover the work that was already performed?
DNA TROUBLESHOOTING
This section contains solutions to the following frequently asked questions.
TABLE 11-3 DNA Troubleshooting FAQs
Problem
I cannot add a file to the jobs queue from a different network machine. Why?
Possible Cause
Although you might be able to see the file in Windows Explorer, the SYSTEM account, which DNA uses, does not have adequate permissions to access the network file.
Solution
You must have administrator rights to access the file so that the Distributed Network Attack (DNA) Server, which runs as a System service, can also access the file. Copy the network file to the local machine. Add the file to DNA. Try to ping the DNA Worker machine from the DNA Supervisor machine. If you can ping the Worker machine, but the DNA Worker is still not responding, first, try restarting the DNA worker from the machine it is running on. If that does not work, reboot the computer that is running the DNA Worker. If you cannot ping the Worker machine, verify that the worker machine is turned on, and try to access network services on it, such as the Internet or printing. If the DNA Worker is still not responding, see the system administrator or call AccessData.
The DNA Worker lost its connection to the network or is turned off.
176
Problem
Possible Cause
Solution
The Stop Worker on User Uncheck the option. Input option has been selected. After I added a job The file is encrypted, but and DNA worked on the password is empty or it, the Password/ contains no characters. User Password column read Empty Password. Why? I added a job, and DNA has still not located the password. Why? To unlock the file, press Enter when you are prompted for a password.
Finding passwords can take Install more DNA Workers with at a long time, depending on least the recommended processor the attack type. requirements. The more machines that Keyspace attacks can take a DNA can use, the faster it can run its very long time, depending tests. on the size of the keyspace. Gather as much information as you can find and add it to a biographical A password may not be dictionary. This helps to ensure the recovered if it is not password or pass-phrase will be contained within the found. selected dictionaries, or covered by Rules you have selected for the job.
What is the difference between the owner keys and passwords and the user keys and passwords?
PDF documents have both owner and user passwords. The owner password is used to open and edit the file. The user password is used to open and read the file.
Use either the owner or user password to unlock the PDF document. Generally, you use the user password to unlock the document. However, in some instances you might use the owner password to modify the file. For example, if the file creator has forgotten the password, you might create a new password for the file.
Chapter 11 Troubleshooting
177
Result
Cancelled Corrupted Failed to Process File in Use Successfully Added Timed Out Unencrypted Unidentifiable
Description
You canceled the processing of the job. The file is corrupted. The file cannot be added to the system. This result is a general tag used for any file that cannot be classified as any other result. The file is locked by another program. The file is added to the job queue. The file cannot be identified by PRTK in five minutes. This result usually appears when PRTK is busy processing other jobs. The file doesnt need to be added because the file isnt encrypted.
PRTK cannot recognize the file and its source application.
Unsupported Version The file was created in an unsupported version of a supported application.
For additional troubleshooting information, contact AccessData Customer Support by emailing your questions to support@accessdata.com, or use the Forensic Forum on the AccessData Web site.
178
This appendix lists the applications and file formats that Password Recovery Toolkit (PRTK) 6.5 and Distributed Network Attack (DNA) 3.5 recognizes, and their corresponding modules. The appendix is divided into sections based on the attack type that PRTK uses to decrypt the file. The last section lists applications that use multiple attack types.
DECRYPTION ATTACK
The decryption attack decrypts the password that locks the file. PRTK uses the decryption attack on the applications listed in the following table.
TABLE A-1 PRTK and DNA Decryption Attack Modules
Supported Application
7-Zip - Support for 4.65, 9.4 -9.10, PS3 Support ACT! 14, 2000, 56 Adobe Acrobat 3.06.0 and Adobe PDF 1.21.6 AOL Desktop Client 8.09.0 Security Edition AOL Instant Messanger through 5.9, 6.9, 7.1, AIM Triton through 1.0.4 Ascend BulletProof FTP 1.032.45
Module
7-Zip Decryption Module ACT! Decryption Module PDF Decryption Module AOL Password Module AIM Password Module Ascend Password Module
BPFTP Password Module
179
Supported Application
Chrome (Google) CuteFTP 25, 7x DataPerfect dBASE 2.x3.x FileMaker 3.x, 5.x Hello 1.0
ICQ 2003b5.04
Module
Google Chrome Decryption Module CuteFTP Password Module DataPerfect Password Module dBASE Password Module FileMaker Password Module Hello Password Module ICQ Password Module Protected Registry Module This module is also used for Outlook Express.
Kaikei through 05 Lotus 1-2-3 of the following versions: 1A4 9 97 FRM Japanese Lotus 1-2-3 seal passwords
Kaikei Password Module Lotus 123 Password Module This module is also used for Lotus Symphony 12 and Lotus 1-2-3 seal passwords.
Lotus 123 Password Module This module is also used for Lotus Symphony and Lotus 1-2-3.
Lotus Approach thorugh 97 Lotus Notes, version 8.5 Lotus Organizer 14 Lotus Symphony 12
Lotus Approach Password Module Lotus Organizer Password Module Lotus 123 Password Module This module is also used for Lotus 12-3 and Lotus 1-2-3 seal passwords.
Lotus WordPro 96, 97, or Millenium Messenger Plus! 3.503.61, 4.82 & 4.83 Microsoft Access Microsoft Money 20022006 Microsoft Office Data (PST) files 2007 or earlier
WordPro Password Module MessengerPlus Password Module MS Access Encryption Module MS Money Password Module MS Outlook PST Password Module
180
Supported Application
Microsoft Office Excel 27, 97 through 2007 Word 26, 97 through 2007 PowerPoint XP through 2007 Microsoft Project 982003 Microsoft Schedule+ 7.x Microsoft SourceSafe 6x Microsoft Visual SourceSafe 6.x MozillaProtectedData Mozilla 1.7x AOL Communicator through 20030919.3 Mozilla Firefox through 1.5 Netscape 7.x8.0 MS Backup MS Mail MSN Messenger through 7.0 MYOB Plus 3.x Premier Accounting 20052006 Business Basics 2 Netscape Mail through 6.x Outlook Express 5.06.0, SMTP password
Module
Microsoft Office Encryption Module
MS Project Password Module Scheduler Password Module SourceSafe Password Module SourceSafe Password Module Mozilla Protected Data Module
MS Backup Password Module MS Mail Password Module MSN Messenger Password Module MYOB Password Module
Netscape Mail Password Module Protected Registry Module This module is also used for Internet Explorer.
Palm Pilot User File Paradox 4.x, 5.x, or 7.x PasswordPal through 2.0 Protected Registery, now supports: Windows 7, TACC, and PS3 Microsoft Internet Explorer 5.06.0 Microsoft Outlook Express 5.06.0 ProWrite PCEncrypt through 9.11 PST through 2007 PWL Quattro Pro 112, X3
Palm Password Module Paradox Password Module PasswordPal Password Module Protected Registry Module
ProWrite Password Module PCEncryption Encryption Module MS Outlook PST Password Module PWL Password Module Quattro Pro Password Module
181
Supported Application
Quickbooks through 2010 Quicken through 2001 SAMFile - 10.6 SAM Files LAN Hash, NT Hash (MD4) Active Directory Steganos Security Suite LockNote Symantec QA 4.x5.x VBA VersaCheck VersaCheck 2001 Home and Pro VersaCheck Platinum 20042007 VersaCheck Enterprise 20042007 2010 Whisper 32 1.16 or earlier Windows 95 Screen Saver Windows XP Credential Files in Windows XP through Service Pack 2 WordPerfect 5.012, X3 WS_FTP 5.0x, 2006 Yahoo! Messenger 3.07.0 Yayoi Kaikei 05 or earlier
Module
Quickbooks Password Module Quicken Password Module SAM File Module
Whisper Password Module Screen Saver Password Module XP Credentials Module WordPerfect Password Module WS_FTP Encryption Module Yahoo! Messenger Password Module Kaikei Password Module
DICTIONARY ATTACK
The dictionary attack uses the words in a dictionary, applies Rules to the words, and applies the password to the files. PRTK uses the dictionary attack on the applications listed in the following table.
TABLE A-2 PRTK and DNA Dictionary Attack Modules
Supported Application
7-Zip 4.65, 9.4-9.10, PS3 ABI Coder 3.5.7.43.6.1.4 Advanced File Lock 7.1
Module
7-Zip Password Module ABI Coder Password Module AdvancedFileLock Password Module
182
Supported Application
Adobe Acrobat 3.06.0 and Adobe PDF 1.21.6 AOL Instant Messenger through 5.9, AIM Triton through 1.0.4 Ami Pro ARJ 2.82 Ashampoo Security Manager 99 Power Encrypt Privacy Protector through 2005 Magic Security BestCrypt 4.x8.20, BCArchive 1.06 CD-Lock Support through 9.50, first 32k needed for unlock.exe CheckWriter 5.x CodedDrag 2.4 crypt htpasswd passwd MD5-based, SHA-based, fcrypt fcrypt; MD5, SHA-1, Blowfish, SHA-256, and SHA-512 based crypt PS3 for SHA-256 and SHA-512 based crypt Cryptainer LE 56 CryptaXix CryptaPix 2.003.05 CryptaFlix 1.003.05 CrypText 2.303.40 CuteFTP 25, 7x DriveCrypt 4.2 DriveCrypt Plus Pack 3.0 Encrypted Magic Folders 3.x, 7.x -- 9.06 Geli New module, 1 through 3. Geli first appeared in Free BSD 6.0. Support has been tested in the latest version, 8.0.
Module
PDF Encryption Module AIM Password Module AmiPro Password Module ARJ Password Module Ashampoo Password Module
BestCrypt Password Module CDLock Password Module CheckWriter Password Module CodedDrag Password Module *nix crypt Password Module
CrypText Password Module CuteFTP Password Module DriveCrypt Password Module DriveCrypt Plus Pack Password Module EMF Password Module Geli Password Module
183
Supported Application
GnuPG 1.4.0 or earlier
Module
PGP Password Module This module is also used for PGP.
HandyBits EasyCrypto Delux 5.5 -- File decryption EasyCrypto Password Module upon completion. htpasswd Icon Lock-IT XP Internet Explorer Content Advisor, version 8 Justsystem Ichitaro 52004 Hanako 3.12004 KeyChain KeePass Password Safe 81.04, 2.08, 2.09, 3.20 Kremlin Encrypt 3.0, Text 3.0 File decryption upon completion MaxCrypt 1.01.10 Messenger Plus! 3.503.61, 4.82 & 4.83 Microsoft Encrypted File System (EFS), Windows 2000 through Windows 7 Microsoft Office Excel 27, 97 through 2007 Word 26, 97 through 2007 PowerPoint XP through 2007 Microsoft Money 20022006 Mozilla Mozilla 1.7x AOL Communicator 20030919.3 FireFox through 1.5 Netscape 7.x8.0 MYOB Plus 3.x Premier Accounting 20052006 Business Basics 2 Norton Secret Stuff 1.0 Omziff 1.03.0.4 *nix crypt Password Module This module is also used for passwd. Lockit Password Module IEContent Password Module Justsystem Password Module
KeyChain Password Module KeePass Password Module Kremlin Password Module MaxCrypt Password Module MessengerPlus Password Module EFS Module Microsoft Office Encryption Module
184
Supported Application
OpenOffice.org Office 1.03.1 StarOffice passwd, MD5- and SHA-based encryption and fcrypt PasswordPal through 2.0 PasswordSafe 13 PC-Encrypt through 9.11 PDF Acrobat 3.09.0, all file types PDF 1.21.6 PFX Microsoft PFX P12 Private Key Format PGP PGP 9.0.2 gnupg 1.4.0 PGP Disk PGP 8.1or earlier PGP Disk 4.06.0 PGP SDA Whole Disk Encryption 9.0 PKZIP
Module
OpenOffice Password Module
*nix crypt Password Module This module is also used for htpasswd. PasswordPal Password Module PasswordSafe Password Module PCEncrypt Encryption Module PDF Encryption Module
ZIP Password Module This module is also used for WinZip 8 or earlier.
PWL Quickbooks 20032010 Quicken 20032006 RAR 1.x3.x SAM files - 10.6 SAM files NT (MD4) hash, LAN hash Active Directory SecureIT 3.1 -- 4.0 SecretStuff 1.0 SiFEU File Encryptor 0.9
PWL Password Module Quickbooks Password Module Quicken Password Module RAR Password Module SAM File Module
SafeHouse Personal Privacy 2, versions 3.04 & 3.06 SafeHouse Password Module
185
Supported Application
Steganos 2009 Security Suite LockNote S-Tools - Removed VBA WinZip 9.014 ZIP WinZip PKZIP 8 - 12.4
Module
Steganos Password Module
Functionality is now found in Steganography module VBA Password Module WinZip9 Password Module ZIP Password Module
KEYSPACE ATTACKS
The keyspace attack is used on applications that use 40-bit encryption or less. Because of the relatively small number of possible keys, DNA tries every possible key until it finds the one that decrypts the file. Some applications use the keyspace attack in conjunction with another attack. For more information, see Multiple Attacks.
TABLE A-3 PRTK and DNA Keyspace Attack Modules
Supported Application
AOL Instant Messanger through 5.9, AIM Triton through 1.0.4 ARJ 2.82 CryptaXix CryptaPix 2.002.24 CryptaFlix 1.001.10 ICQ 2003b5.04 Microsoft Office Excell 27, 97,2000, XP, 2003 Word 26, 97,2000, XP, 2003 PowerPoint XP, 2003 PDF Acrobat 3.06.0 PDF 1.21.6 PWL
Module
AIM Password Module ARJ Password Module CryptaXix Password Module
186
Supported Application
SAM files, 10.6 SAM files NT (MD4) hash, LAN hash Active Directory SecretStuff 1.0 ZIP WinZip 9 - 14 PKZIP 8
Module
SAM File Module
RESET ATTACKS
Reset attack is the least common attack type used by PRTK because few applications are susceptible to it.
TABLE A-4 Reset Attack Modules Supported Application Ashampoo Security Manager 99 Power Encrypt Privacy Protector through 2005 Magic Security DriveCrypt 4.2 MSN Messenger through 7.0 MYOB Plus 3.x Premier Accounting 20052006 Business Basics 2 Quickbooks 20032010 Quicken 20032006 VBA PRTK Module Ashampoo Password Module
DriveCrypt Password Module MSN Messenger Password Module MYOB Password Module
MULTIPLE ATTACKS
Some applications are susceptible to more than one attack type. Multiple attacks can be used to decrease the time necessary to decrypt a file. For applications where multiple attack types can be used, PRTK starts with the least time-consuming attack type.
187
For example, PRTK might use a dictionary attack first on a PowerPoint spreadsheet and then use the key space attack if the file isnt decrypted during the dictionary attack.
PRTK uses multiple attack types on the applications listed in the following table. The order in which the attack types are listed in the table is the order that PRTK uses. TABLE A-5 PRTK and DNA Multiple Attack-Type Modules
Supported Application
AOL 8.09.0 Security Edition AOL Communicator 20030919.3 or earlier
Attack Types
Decryption Keyspace Dictionary Decryption
PRTK Module
AOL Password Module The dictionary attack uses the Mozilla Master Password Module. This module is also used for Mozilla, Mozilla Firefox, and Netscape. The decryption attack uses the Mozilla Protected Data Module. This module is also used for Mozilla, Mozilla Firefox, and Netscape.
Keyspace Dictionary
DriveCrypt 4.2 through 5.4 Dictionary Reset HandyBits EasyCrypto Deluxe 5.5 -- File decryption upon completion Microsoft Excel 27, 97, 2000, XP, 2003 Dictionary Decryption
Dictionary Decryption
Microsoft Office Encryption Module This module is also used for Microsoft Word and Microsoft PowerPoint.
188
Supported Application
Attack Types
PRTK Module
MS Money Password Module
Microsoft Money 972004, Dictionary Decryption backup files Versions of Microsoft Money before 2002 use the decryption attack. Microsoft Money 200204 uses the dictionary attack. Microsoft PowerPoint XP and 2003 Dictionary Decryption
Microsoft Office Encryption Module This module is also used for Microsoft Excel and Microsoft PowerPoint.
Dictionary Decryption
Microsoft Office Encryption Module This module is also used for Microsoft Excel and Microsoft PowerPoint.
Dictionary Decryption
The dictionary attack uses the Mozilla Master Password Module. This module is also used for AOL Communicator, Mozilla Firefox, and Netscape. The decryption attack uses the Mozilla Protected Data Module. This module is also used for AOL Communicator, Mozilla Firefox, and Netscape.
189
Supported Application
Mozilla Firefox 1.0.4 or earlier
Attack Types
Dictionary Decryption
PRTK Module
The dictionary attack uses the Mozilla Master Password Module. This module is also used for AOL Communicator, Mozilla, and Netscape. The decryption attack uses the Mozilla Protected Data Module. This module is also used for AOL Communicator, Mozilla, and Netscape.
Netscape 7.x8.0
Dictionary Decryption
The dictionary attack uses the Mozilla Master Password Module. This module is also used for AOL Communicator, Mozilla, and Mozilla Firefox. The decryption attack uses the Mozilla Protected Data Module. This module is also used for AOL Communicator, Mozilla, and Mozilla Firefox.
Dictionary Decryption PRTK uses a decryption attack to recover the file passwords for QuickBooks 2001 or earlier. To open a recovered file, open it in QuickBooks and enter the recovered password when prompted.
190
Supported Application
QuickBooks 20032004
Attack Types
PRTK Module
PRTK resets the file QuickBooks Password passwords for QuickBooks Module 20032004. To open a recovered file, open it in QuickBooks and enter a blank password when prompted. Dictionary Decryption Reset PRTK uses a dictionary attack to recover the file passwords for Quicken 20032004. A decryption attack is used for Quicken 2001 or earlier. PRTK resets the password to a blank password for Quicken 2002. Quicken Password Module
Visual Basic for Applications (VBA) Windows PWL files WinZip 8 or earlier
PWL Password Module ZIP Password Module This module is also used for PKZIP.
191
192
A profile is the combination of four individual components: Languages, Character Groups, Dictionaries, and Rules, each described below.
LANGUAGES
Language selection affects two aspects of password recovery: the dictionaries selected for dictionary attacks (which can also be independently selected and deselected), and the character sets that will be used in Rules that use computer generated characters as opposed to reading words from a dictionary. PRTK 6.5 and DNA 3.5 currently support the following character sets: Arabic, English, French, German, Italian, Russian and Spanish.
CHARACTER GROUPS
Character groups allow a profile to refine and expand the set of characters that will be used in Rules that generate characters. The following character groups can be selected or deselected for the given profile:
TABLE B-1 Available Character Groups
Character Group
All 7-bit Characters (ASCII) All 8-bit Characters
Description
Character represented by a value from 0 to 127 encoded as a byte. Character represented by a value from 0 to 255 encoded as a byte.
193
Character Group
Uppercase Letters
Description
Characters represented as uppercase for the selected languages in the profile (for languages that support uppercase and lowercase characters). Characters represented as lowercase for the selected languages in the profile (for languages that support uppercase and lowercase characters). The combination of a character and an additional mark sometimes referred to as an accent. Characters represented as numbers for the selected languages in the profile (for languages that support digit characters). Non-Alphanumeric characters that can be found on a keyboard. Non-Alphanumeric characters that cannot be found on a keyboard. Characters selected from the character map utility provided in Microsoft Windows, for example.
Lowercase Letters
Diacritics Digits
DEFAULT DICTIONARIES
Dictionaries are word list groupings that have been complied in several different languages in both a codepage and Unicode format. PRTK6.5 and DNA 3.5 will select the correct format depending on whether a module uses codepage or Unicode. Once a dictionary has reached 500,000 entries, a new codepage and Unicode dictionary is created.
PRTK 6.5 and DNA 3.5 ship with the following dictionaries: TABLE B-2 Default Dictionaries Listed by Default Language Profile Language Arabic Format [AR-1] Names-ar-c.adf: Arabic Names (codepage) [AR-1] Names-ar-u.adf: Arabic Names (Unicode) [AR-2] Quran-ar-c.adf: Arabic words from the Quran (codepage) [AR-2] Quran-ar-u.adf: Arabic words from the Quran (Unicode) [AR-3] General-ar-c.adf: General Arabic words (codepage) [AR-3] General-ar-u.adf: General Arabic words (Unicode)
194
TABLE B-2 Default Dictionaries Listed by Default Language Profile Language German Format [DE-1] General-1-de-c.adf: General German words List 1 (codepage) [DE-1] General-1-de-u.adf: General German words List 1 (Unicode) [DE-1] General-2-de-c.adf: General German words List 2 (codepage) [DE-1] General-2-de-u.adf: General German words List 2 (Unicode) [DE-1] General-3-de-c.adf: General German words List 3 (codepage) [DE-1] General-3-de-u.adf: General German words List 3 (Unicode) [DE-1] General-4-de-c.adf: General German words List 4 (codepage) [DE-1] General-4-de-u.adf: General German words List 4 (Unicode) English [EN-1] Common-en-c.adf: Common English words and passwords (codepage) [EN-1] Common-en-u.adf: Common English words and passwords (Unicode) [EN-2] Miscellaneous-en-c.adf: Crime related, keyboard sequences and words that may not be found in normal dictionaries (codepage) [EN-2] Miscellaneous-en-u.adf: Crime related, keyboard sequences and words that may not be found in normal dictionaries (Unicode) [EN-3] Names-en-c.adf: Common English first names, last names and business names (Codepage) [EN-3] Names-en-u.adf: Common English first names, last names and business names (Unicode) [EN-4] General-1-en-c.adf: General English words, not found in the other English dictionaries List 1 (codepage) [EN-4] General-1-en-u.adf: General English words, not found in the other English dictionaries List 1 (Unicode) [EN-4] General-2-en-c.adf: General English words, not found in the other English dictionaries List 2 (codepage) [EN-4] General-2-en-u.adf: General English words, not found in the other English dictionaries List 2 (Unicode) Spanish French Italian [ES-1] General-es-c.adf: General Spanish words (codepage) [ES-1] General-es-u.adf: General Spanish words (Unicode) [FR-1] General-fr-c.adf: General French words (codepage) [FR-1] General-fr-u.adf: General French words (Unicode) [IT-1] General-it-c.adf: General Italian words (codepage) [IT-1] General-it-u.adf: General Italian words (Unicode)
195
TABLE B-2 Default Dictionaries Listed by Default Language Profile Language Japanese Format [JA-1] Hiragana-ja-c.adf: Japanese words from the Hiragana dialect (codepage) [JA-1] Hiragana-ja-u.adf: Japanese words from the Hiragana dialect (Unicode) [JA-2] Kanji-ja-c.adf: Japanese words from the Kanji dialect (codepage) [JA-2] Kanji-ja-u.adf: Japanese words from the Kanji dialect (Unicode) [JA-3] Katakana-ja-c.adf: Japanese words from the Katakana dialect (codepage) [JA-3] Katakana-ja-u.adf: Japanese words from the Katakana dialect (Unicode) Russian [RU-1] General-1-ru-c.adf: General Russian words list 1 (codepage) [RU-1] General-1-ru-u.adf: General Russian words list 1 (Unicode) [RU-1] General-2-ru-c.adf: General Russian words list 2 (codepage) [RU-1] General-2-ru-u.adf: General Russian words list 2 (Unicode) Slovak [SK-1] General-sk-c.adf: General Slovak words (codepage) [SK-1] General-sk-u.adf: General Slovak words (Unicode)
RULES
Rules create password tests that are:
Words that are read from dictionaries Characters that are computer generated A combination of both
This table lists the intensity of each Rule:
TABLE B-3 Basic, Advanced, and Pass Phrase Rules Differences
Attempt Category
Basic (BAS)
Attempt Intensity
1Less than one-million tests 2One-million to one-billion tests 3One-billion to ten-billion tests
Advanced (ADV)
1Ten-billion to 25-billion tests 225-billion to 50-billion tests 350-billion to 100-billion tests 4More than 100-billion tests
196
Attempt Category
Pass Phrase (PP)
Attempt Intensity
1Less that 100-billion tests 2100-billion to one-trillion tests 3More than one-trillion tests
197
TABLE B-4 PRTK 6.5 & DNA 3.5 Default Rule Order Rule (BAS-2-07) (BAS-2-08) (BAS-2-09) (BAS-2-10) (BAS-2-11) (BAS-2-12) (BAS-2-13) (BAS-2-14) (BAS-2-15) (BAS-2-16) (BAS-2-17) (BAS-2-18) (BAS-2-19) (BAS-2-20) (BAS-2-21) (BAS-2-22) (BAS-2-23) (BAS-2-24) (BAS-2-25) (BAS-2-26) (BAS-2-27) (BAS-2-28) (BAS-2-29) Description Six Markov characters with a threshold of one primary reverse search Seven digit search Example enrolc 7777777
Seven Markov characters with a threshold of fifty primary drotune search Seven Markov characters with a threshold of fifty primary enutord reverse search Seven Markov characters with a threshold of one hundred with two characters upper cased search Seven digit telephone number search Eight digit search 555-1234 98765432
Eight Markov characters with a threshold of fifty primary schroten search Eight Markov characters with a threshold of fifty primary netorhcs reverse search Eight Markov characters with a threshold of one hundred with two characters upper cased search Dictionary primary search Dictionary primary reverse search Dictionary with two characters upper cased search Dictionary primary character replacements search Apple llabesab peACh b@n@n@
Dictionary primary followed by common postfixes search jazz#1 Dictionary primary preceded by common prefixes search drBob Dictionary primary followed by a one digit search Dictionary primary preceded by a one digit search Dictionary primary followed by a one letter, language specific search Dictionary primary preceded by a one letter, language specific search Dictionary primary followed by a non-alphanumeric symbol search orange2 1pear strawberryQ xCherry plum$
Dictionary primary preceded by a language-specific non- ^raspberry alphanumeric symbol search Dictionary primary character replacement, followed by a one digit search @pple5
198
TABLE B-4 PRTK 6.5 & DNA 3.5 Default Rule Order Rule (BAS-2-30) (BAS-2-31) (BAS-2-32) (BAS-2-33) (BAS-2-34) (BAS-2-35) (BAS-2-36) (BAS-2-37) (BAS-2-38) (BAS-2-39) (BAS-2-40) (BAS-2-41) (BAS-2-42) (BAS-2-43) (BAS-3-01) (BAS-3-02) (BAS-3-03) (BAS-3-04) (BAS-3-05) (BAS-3-06) (BAS-3-07) Description Example Dictionary primary character replacement, preceded by a 3Pea[h one digit search Dictionary primary preceded and followed by a one digit 4orange4 search Dictionary primary followed by a two digits search Dictionary primary preceded by a two digits search Dictionary primary preceded by common prefixes and followed by a one digit search Dictionary primary preceded by one digit followed by common postfixes Date Search (Two digit year) Three letter, language specific characters followed by common postfixes Three letter, language specific characters preceded by common prefixes bANANA55 12CHERRY mrAnderson1 3cats 12-17-83 trw123 abcmgh
Five Markov Characters with a threshold of one followed revid123 by common postfixes Five Markov Characters with a threshold of one preceded abcrevid by common prefixes Six Markov Characters with a threshold of fifty followed by common postfixes Six Markov Characters with a threshold of fifty preceded by common prefixes Nine Markov characters with a threshold of one hundred search Dictionary primary with a non-alphanumeric symbol inserted search Dictionary primary character replacement, followed by a two digit search app&le @apple23
Dictionary primary character replacement, preceded by a 76app|e two digit search Dictionary primary followed by a three digit search Dictionary primary preceded by a three digit search Social Security Number Search Four letter, language specific characters preceded by common prefixes apple258 987apple 123-45-6789 abcPoUy
199
TABLE B-4 PRTK 6.5 & DNA 3.5 Default Rule Order Rule (BAS-3-08) (ADV-1-01) (ADV-1-02) (ADV-1-03) (ADV-1-04) (ADV-1-05) (ADV-1-06) (ADV-1-07) (ADV-1-08) (ADV-1-09) (ADV-1-10) (ADV-1-11) (ADV-1-12) (ADV-1-13) (ADV-1-14) (ADV-1-15) (ADV-1-16) (ADV-1-17) (ADV-1-18) (ADV-1-19) Description Four letter, language specific characters followed by common postfixes All one-character, language-specific search All two character, language-specific search All three-character, language-specific search All four-character, language-specific search One digit followed by three language-specific characters search Three language-specific characters followed by one digit search One language-specific character followed by a four digit search One digit followed by four language-specific characters search Two language-specific characters followed by a three digit search Example Asdf123 a 1a !1a 1a% 7!qy tuh5 *1234 5wert xx333
Two digits followed by three language-specific characters 93!Q2 search Three language-specific characters followed by a two digit !@d56 search Four language-specific characters followed by a one digit A$Df6 search Four language-specific characters followed by a nonalphanumeric symbol search Four language-specific characters preceded by a nonalphanumeric symbol search Six letter, language specific search Two digits followed by four language-specific characters search Two language-specific characters followed by four digits search Three language-specific characters followed by a three digit search P0&6@ $t7^3 QwErTy 22asD% $%1234 4%$123
200
TABLE B-4 PRTK 6.5 & DNA 3.5 Default Rule Order Rule (ADV-1-20) (ADV-1-21) (ADV-1-22) (ADV-1-23) (ADV-1-24) (ADV-1-25) (ADV-1-26) (ADV-1-27) (ADV-2-01) (ADV-3-01) (ADV-3-02) (ADV-4-01) (ADV-4-02) (ADV-4-03) (ADV-4-04) (ADV-4-05) (ADV-4-06) (ADV-4-07) (ADV-4-08) (ADV-4-09) (ADV-4-10) (ADV-4-11) (PP-1-01) (PP-1-02) Description Dictionary primary followed by a two letter, language specific search Dictionary primary preceded by a two letter, language specific search Dictionary primary preceded by a two digit followed by common postfixes Dictionary primary preceded by common prefixes and followed by a two digit search Example Appleff quapple 12appleabc abcapple12
Dictionary primary preceded and followed by a two digit 12apple34 search Dictionary primary followed by a four digit search Dictionary primary preceded by a four digit search Ten digit telephone number search All five-character, language-specific search Four language-specific characters with a nonalphanumeric symbol inserted search Four language-specific characters followed by a three digit search All six-character, language-specific search Seven letter search All seven-character, language-specific search Eight letter search All eight-character, language-specific search Nine letter, language specific search All nine-character, language-specific search Ten letter, language specific search All ten-character, language-specific search All eleven-character, language-specific search All twelve-character, language-specific search Two word concatenation without spaces search Two word concatenation with spaces search apple4567 2468apple 800-555-8888 Hg^(s a3&c8 r6zg555 Dg*4g& aAbBcCd a1!c$t7 sLdKIenD !@#$12we aISODheKg *&g1234 SOdkghdlSJ 1a!2b@3c#4 1a!2b@3c#4D 1a!2b@3c#4D $ dogcat cat dog
If you create additional Rules, more Rules are added to the password attacks. If you select Customized Dictionaries, more Rules will be added to the attack.
201
PROFILES
DNA and PRTK share the same profile names, though the DNA Profiles use additional Rules (suggested for distributed processing only). These Profiles are discussed in detail later in this chapter. TABLE B-5 PRTK & DNA Default Profiles Profile Name Profile Name
ENGLISH
The English profile begins by searching for simple passwords, followed by, dictionary and permutated dictionary searches, and ends with complex searches for dictionary and computed password. The program uses all default English dictionaries and character sets.
DICTIONARIES:
TABLE B-6 Default Dictionaries for the English Profile Dictionary Name [EN-1] Common-en-c.adf [EN-1] Common-en-u.adf [EN-2] Miscellaneous-en-c.adf [EN-2] Miscellaneous-en-u.adf [EN-3] Names-en-c.adf Dictionary Name [EN-3] Names-en-u.adf [EN-4] General-1-en-c.adf [EN-4] General-1-en-u.adf [EN-4] General-2-en-c.adf [EN-4] General-2-en-u.adf
202
4. (BAS-1-07) Four digit search 5. (BAS-1-08) Five digit search 6. (BAS-1-02) One letter, language specific search 7. (BAS-1-04) Two letter, language specific search 8. (BAS-1-06) Three letter, language specific search 9. (ADV-1-01) All one-character, language-specific search 10. (BAS-1-11) Four Markov characters with a threshold of one primary search 11. (BAS-2-03) Five Markov characters with a threshold of one primary search 12. (BAS-2-17) Dictionary primary search 13. (BAS-2-01) Four letter, language specific search 14. (BAS-2-04) Five Markov characters with a threshold of one primary reverse search 15. (ADV-1-07) One language-specific character followed by a four digit search 16. (BAS-1-10) Six digit search 17. (BAS-2-36) Date Search (two digit year) 18. (ADV-1-03) All three-character, language-specific search 19. (BAS-2-05) Six Markov characters with a threshold of one primary search 20. (BAS-2-09) Seven Markov characters with a threshold of fifty primary search 21. (BAS-2-21) Dictionary primary followed by common postfixes search 22. (BAS-2-22) Dictionary primary preceded by common prefixes search 23. (BAS-2-23) Dictionary primary followed by a one digit search 24. (BAS-2-24) Dictionary primary preceded by a one digit search 25. (BAS-2-25) Dictionary primary followed by a one letter, language specific search 26. (BAS-2-26) Dictionary primary preceded by a one letter, language specific search 27. (BAS-2-20) Dictionary primary character replacements search 28. (BAS-2-13) Eight digit search 29. (BAS-2-12) Seven digit telephone number search 30. (ADV-1-05) One digit followed by three language-specific characters search 31. (ADV-1-06) Three language-specific characters followed by one digit search 32. (BAS-2-10) Seven Markov characters with a threshold of fifty primary reverse
search
33. (BAS-2-02) Five letter, language specific search 34. (ADV-1-17) Two language-specific characters followed by four digits search 35. (BAS-2-14) Eight Markov characters with a threshold of fifty primary search
203
36. (BAS-2-15) Eight Markov characters with a threshold of fifty primary reverse
search
37. (BAS-2-27) Dictionary primary followed by a non-alphanumeric symbol search 38. (BAS-2-28) Dictionary primary preceded by a language-specific non-alphanumeric
symbol search
39. (BAS-2-32) Dictionary primary followed by a two digits search 40. (BAS-2-33) Dictionary primary preceded by a two digits search 41. (BAS-2-31) Dictionary primary preceded and followed by a one digit search 42. (BAS-2-19) Dictionary with two characters upper cased search 43. (BAS-2-43) Nine Markov characters with a threshold of one hundred search 44. (ADV-1-10) Two digits followed by three language-specific characters search 45. (ADV-1-11) Three language-specific characters followed by a two digit search 46. (ADV-1-04) All four-character, language-specific search 47. (BAS-3-01) Dictionary primary with a non-alphanumeric symbol inserted search 48. (BAS-3-04) Dictionary primary followed by a three digit search 49. (BAS-3-05) Dictionary primary preceded by a three digit search 50. (BAS-3-06) Social Security Number Search 51. (ADV-1-18) Three language-specific characters followed by a three digit search 52. (ADV-1-08) One digit followed by four language-specific characters search 53. (ADV-1-12) Four language-specific characters followed by a one digit search 54. (ADV-1-20) Dictionary primary followed by a two letter, language specific search 55. (ADV-1-21) Dictionary primary preceded by a two letter, language specific search 56. (ADV-1-15) Six letter, language specific search 57. English Transitional 58. English Transitional follows the same order of the DNA 3.1 and PRTK 6.1 English
ARABIC
The Arabic profile begins by searching for simple passwords, followed by, dictionary and permutated dictionary searches, and ends with complex searches for dictionary and computed password. All default Arabic dictionaries and character sets are used.
204
DICTIONARIES
TABLE B-7 Default Dictionaries for the Arabic Profile Dictionary Name [AR-1] Names-ar-c.adf [AR-1] Names-ar-u.adf [AR-2] Quran-ar-c.adf Dictionary Name [AR-2] Quran-ar-u.adf [AR-3] General-ar-c.adf [AR-3] General-ar-u.adf
205
26. (BAS-2-23) Dictionary primary followed by a one digit search 27. (BAS-2-24) Dictionary primary preceded by a one digit search 28. (BAS-2-25) Dictionary primary followed by a one letter, language specific search 29. (BAS-2-26) Dictionary primary preceded by a one letter, language specific search 30. (BAS-2-20) Dictionary primary character replacements search 31. (BAS-2-13) Eight digit search 32. (BAS-2-12) 7-digit telephone number search 33. (ADV-1-05) One digit followed by three language-specific characters search 34. (BAS-2-10) Seven Markov characters with a threshold of fifty primary reverse
search
35. (BAS-2-02) Five letter, language specific search 36. (ADV-1-17) Two language-specific characters followed by four digits search 37. (BAS-2-14) Eight Markov characters with a threshold of fifty primary search 38. (BAS-2-15) Eight Markov characters with a threshold of fifty primary reverse
search
39. (BAS-2-27) Dictionary primary followed by a non-alphanumeric symbol search 40. (BAS-2-28) Dictionary primary preceded by a language-specific non-alphanumeric
symbol search
41. (BAS-2-32) Dictionary primary followed by a two digits search 42. (BAS-2-33) Dictionary primary preceded by a two digits search 43. (BAS-2-31) Dictionary primary preceded and followed by a one digit search 44. (BAS-2-19) Dictionary with two characters upper cased search 45. (ADV-1-10) Two digits followed by three language-specific characters search 46. (ADV-1-11) Three language-specific characters followed by a two digit search 47. (ADV-1-04) All four-character, language-specific search 48. (BAS-3-04) Dictionary primary followed by a three digit search 49. (BAS-3-05) Dictionary primary preceded by a three digit search 50. (BAS-3-06) Social Security Number Search 51. (ADV-1-18) Three language-specific characters followed by a three digit search 52. (ADV-1-08) One digit followed by four language-specific characters search 53. (ADV-1-12) Four language-specific characters followed by a one digit search 54. (ADV-1-20) Dictionary primary followed by a two letter, language specific search 55. (ADV-1-21) Dictionary primary preceded by a two letter, language specific search 56. (ADV-1-15) Six letter, language specific search
206
EUROPEAN
The European profile begins by searching for simple passwords, followed by dictionary and permutated dictionary searches, and ends with complex searches for dictionary and computed password. All default German, French, Italian, and Spanish dictionaries and character sets are used.
DICTIONARIES
TABLE B-8 Default Dictionaries for the European Profile [DE-1] General-1-de-c.adf [DE-1] General-1-de-u.adf [DE-1] General-2-de-c.adf [DE-1] General-2-de-u.adf [DE-1] General-3-de-c.adf [DE-1] General-3-de-u.adf [DE-1] General-4-de-c.adf [DE-1] General-4-de-u.adf [ES-1] General-es-c.adf [ES-1] General-es-u.adf [FR-1] General-fr-c.adf [FR-1] General-fr-u.adf [IT-1] General-it-c.adf [IT-1] General-it-u.adf
207
16. (ADV-1-07) One language-specific character followed by a four digit search 17. (BAS-1-10) Six digit search 18. (BAS-2-36) Date Search (two digit year) 19. (ADV-1-03) All three-character, language-specific search 20. (BAS-2-18) Dictionary primary reverse search 21. (BAS-2-05) Six Markov characters with a threshold of one primary search 22. (BAS-2-07) Six Markov characters with a threshold of one primary reverse search 23. (BAS-2-09) Seven Markov characters with a threshold of fifty primary search 24. (BAS-2-21) Dictionary primary followed by common postfixes search 25. (BAS-2-22) Dictionary primary preceded by common prefixes search 26. (BAS-2-23) Dictionary primary followed by a one digit search 27. (BAS-2-24) Dictionary primary preceded by a one digit search 28. (BAS-2-25) Dictionary primary followed by a one letter, language specific search 29. (BAS-2-26) Dictionary primary preceded by a one letter, language specific search 30. (BAS-2-20) Dictionary primary character replacements search 31. (BAS-2-13) Eight digit search 32. (BAS-2-12) Seven digit telephone number search 33. (ADV-1-05) One digit followed by three language-specific characters search 34. (BAS-2-10) Seven Markov characters with a threshold of fifty primary reverse
search
35. (BAS-2-02) Five letter, language specific search 36. (ADV-1-17) Two language-specific characters followed by four digits search 37. (BAS-2-14) Eight Markov characters with a threshold of fifty primary search 38. (BAS-2-15) Eight Markov characters with a threshold of fifty primary reverse
search
39. (BAS-2-27) Dictionary primary followed by a non-alphanumeric symbol search 40. (BAS-2-28) Dictionary primary preceded by a language-specific non-alphanumeric
symbol search
41. (BAS-2-32) Dictionary primary followed by a two digits search 42. (BAS-2-33) Dictionary primary preceded by a two digits search 43. (BAS-2-31) Dictionary primary preceded and followed by a one digit search 44. (BAS-2-19) Dictionary with two characters upper cased search 45. (ADV-1-10) Two digits followed by three language-specific characters search 46. (ADV-1-11) Three language-specific characters followed by a two digit search 47. (ADV-1-04) All four-character, language-specific search
208
48. (BAS-3-04) Dictionary primary followed by a three digit search 49. (BAS-3-05) Dictionary primary preceded by a three digit search 50. (BAS-3-06) Social Security Number Search 51. (ADV-1-18) Three language-specific characters followed by a three digit search 52. (ADV-1-08) One digit followed by four language-specific characters search 53. (ADV-1-12) Four language-specific characters followed by a one digit search 54. (ADV-1-20) Dictionary primary followed by a two letter, language specific search 55. (ADV-1-21) Dictionary primary preceded by a two letter, language specific search 56. (ADV-1-15) Six letter, language specific search
RUSSIAN
The Russian profile begins by searching for simple passwords, followed by, dictionary and permutated dictionary searches, and ends with complex searches for dictionary and computed password. All default Russian dictionaries and character sets are used.
DICTIONARIES
TABLE B-9 Default Dictionaries for the Default Russian Profile Dictionary Name [RU-1] General-1-ru-c.adf [RU-1] General-1-ru-u.adf Dictionary Name [RU-1] General-2-ru-c.adf [RU-1] General-2-ru-u.adf
209
12. (BAS-2-03) Five Markov characters with a threshold of one primary search 13. (BAS-2-17) Dictionary primary search 14. (BAS-2-01) Four letter, language specific search 15. (BAS-2-04) Five Markov characters with a threshold of one primary reverse search 16. (ADV-1-07) One language-specific character followed by a four digit search 17. (BAS-1-10) Six digit search 18. (BAS-2-36) Date Search (Two digit year) 19. (ADV-1-03) All three-character, language-specific search 20. (BAS-2-18) Dictionary primary reverse search 21. (BAS-2-05) Six Markov characters with a threshold of one primary search 22. (BAS-2-07) Six Markov characters with a threshold of one primary reverse search 23. (BAS-2-09) Seven Markov characters with a threshold of fifty primary search 24. (BAS-2-21) Dictionary primary followed by common postfixes search 25. (BAS-2-22) Dictionary primary preceded by common prefixes search 26. (BAS-2-23) Dictionary primary followed by a one digit search 27. (BAS-2-24) Dictionary primary preceded by a one digit search 28. (BAS-2-25) Dictionary primary followed by a one letter, language specific search 29. (BAS-2-26) Dictionary primary preceded by a one letter, language specific search 30. (BAS-2-20) Dictionary primary character replacements search 31. (BAS-2-13) Eight digit search 32. (BAS-2-12) Seven digit telephone number search 33. (ADV-1-05) One digit followed by three language-specific characters search 34. (BAS-2-10) Seven Markov characters with a threshold of fifty primary reverse
search
35. (BAS-2-02) Five letter, language specific search 36. (ADV-1-17) Two language-specific characters followed by four digits search 37. (BAS-2-14) Eight Markov characters with a threshold of fifty primary search 38. (BAS-2-15) Eight Markov characters with a threshold of fifty primary reverse
search
39. (BAS-2-27) Dictionary primary followed by a non-alphanumeric symbol search 40. (BAS-2-28) Dictionary primary preceded by a language-specific non-alphanumeric
symbol search
41. (BAS-2-32) Dictionary primary followed by a two digits search 42. (BAS-2-33) Dictionary primary preceded by a two digits search 43. (BAS-2-31) Dictionary primary preceded and followed by a one digit search
210
44. (BAS-2-19) Dictionary with two characters upper cased search 45. (ADV-1-10) Two digits followed by three language-specific characters search 46. (ADV-1-11) Three language-specific characters followed by a two digit search 47. (ADV-1-04) All four-character, language-specific search 48. (BAS-3-04) Dictionary primary followed by a three digit search 49. (BAS-3-05) Dictionary primary preceded by a three digit search 50. (BAS-3-06) Social Security Number Search 51. (ADV-1-18) Three language-specific characters followed by a three digit search 52. (ADV-1-08) One digit followed by four language-specific characters search 53. (ADV-1-12) Four language-specific characters followed by a one digit search 54. (ADV-1-20) Dictionary primary followed by a two letter, language specific search 55. (ADV-1-21) Dictionary primary preceded by a two letter, language specific search 56. (ADV-1-15) Six letter, language specific search
PASS-PHRASE
All Pass-phrase Rules are in English
DICTIONARIES
TABLE B-10 Default Dictionaries for the Default Pass-Phrase Profile Dictionary Name [EN-1] Common-en-c.adf [EN-1] Common-en-u.adf [EN-2] Miscellaneous-en-c.adf [EN-2] Miscellaneous-en-u.adf [EN-3] Names-en-c.adf Dictionary Name [EN-3] Names-en-u.adf [EN-4] General-1-en-c.adf [EN-4] General-1-en-u.adf [EN-4] General-2-en-c.adf [EN-4] General-2-en-u.adf
phrase search
3. (PP-2-01) Word inserted into another word search
211
Dictionary search
5. (PP-2-03) Two word pass-phrase using the common English dictionary 6. (PP-3-01) Three word concatenation without spaces search 7. (PP-3-02) Three word concatenation with spaces search 8. (PP-3-03) Four word concatenation without spaces search 9. (PP-3-04) Four word concatenation with spaces search
FTK IMPORT
Used as a template for FTK imported word lists.
DICTIONARIES
None Defined. Intended for user to select FTK imported dictionaries.
RULES
Dictionary normalized, lowercase search.
PRTK
Rules in this profile are ordered by research conducted on recovered passwords.
DICTIONARIES
TABLE B-11 Default Dictionaries for the Default PRTK Profile Dictionary Name [EN-1] Common-en-c.adf [EN-1] Common-en-u.adf [EN-2] Miscellaneous-en-c.adf [EN-2] Miscellaneous-en-u.adf [EN-3] Names-en-c.adf Dictionary Name [EN-3] Names-en-u.adf [EN-4] General-1-en-c.adf [EN-4] General-1-en-u.adf [EN-4] General-2-en-c.adf [EN-4] General-2-en-u.adf
212
2. (BAS-1-07) Four digit search 3. (BAS-1-03) Two digit search 4. (BAS-2-17) Dictionary primary search 5. (BAS-1-02) One letter, language specific search 6. (BAS-1-05) Three digit search 7. (ADV-1-01) All one-character, language-specific search 8. (BAS-1-04) Two letter, language specific search 9. (BAS-2-23) Dictionary primary followed by a one digit search 10. (BAS-1-08) Five digit search 11. (ADV-1-02) All two character, language-specific search 12. (BAS-1-06) Three letter, language specific search 13. (BAS-1-10) Six digit search 14. (BAS-2-01) Four letter, language specific search 15. (ADV-1-03) All three-character, language-specific search 16. (BAS-2-25) Dictionary primary followed by a one letter, language specific search 17. (BAS-2-08) Seven digit search 18. (ADV-1-04) All four-character, language-specific search 19. (ADV-1-09) Two language-specific characters followed by a three digit search 20. (BAS-2-20) Dictionary primary character replacements search 21. (BAS-2-03) Five Markov characters with a threshold of one primary search 22. (BAS-2-13) Eight digit search 23. (BAS-2-02) Five letter, language specific search 24. (BAS-2-32) Dictionary primary followed by a two digits search 25. (ADV-1-20) Dictionary primary followed by a two letter, language specific search 26. (BAS-2-09) Seven Markov characters with a threshold of fifty primary search 27. (ADV-1-07) One language-specific character followed by a four digit search 28. (BAS-2-26) Dictionary primary preceded by a one letter, language specific search 29. (BAS-2-18) Dictionary primary reverse search 30. (ADV-1-05) One digit followed by three language-specific characters search 31. (ADV-1-15) Six letter, language specific search 32. (ADV-2-01) All five-character, language-specific search
213
DNA
Rules in this profile are ordered by research conducted on recovered passwords.
DICTIONARIES
TABLE B-12 Default Dictionaries for the Default DNA Profile Dictionary Name [EN-1] Common-en-c.adf [EN-1] Common-en-u.adf [EN-2] Miscellaneous-en-c.adf [EN-2] Miscellaneous-en-u.adf [EN-3] Names-en-c.adf Dictionary Name [EN-3] Names-en-u.adf [EN-4] General-1-en-c.adf [EN-4] General-1-en-u.adf [EN-4] General-2-en-c.adf [EN-4] General-2-en-u.adf
214
20. (BAS-2-20) Dictionary primary character replacements search 21. (BAS-2-03) Five Markov characters with a threshold of one primary search 22. (BAS-2-13) Eight digit search 23. (BAS-2-02) Five letter, language specific search 24. (BAS-2-32) Dictionary primary followed by a two digits search 25. (ADV-1-20) Dictionary primary followed by a two letter, language specific search 26. (BAS-2-09) Seven Markov characters with a threshold of fifty primary search 27. (ADV-1-07) One language-specific character followed by a four digit search 28. (BAS-2-26) Dictionary primary preceded by a one letter, language specific search 29. (BAS-2-18) Dictionary primary reverse search
CHARACTER REPLACEMENTS
This list shows characters commonly replaced for each other:
TABLE B-13 PRTK and DNA Common Character Replacements Replace 1 with L Replace 1 with i Replace 3 with ] Replace 3 with } Replace a with @ Replace a with 4 Replace a with 2 Replace b with 3 Replace c with ( Replace e with 3 Replace e with 3 Replace e with [ Replace e with { Replace f with ph Replace g with @ Replace h with 4 Replace i with ! Replace i with 1 Replace i with ][ Replace i with | Replace l with | Replace l with ! Replace L with 1 Replace o with 0 Replace o with () Replace ph with f Replace s with 5 Replace s with $ Replace z with 5
COMMON PREFIXES
The following is a list of common prefixes known to PRTK and DNA.
TABLE B-14 PRTK and DNA Common Prefixes 123 abc mr !@# 4u 4u2 2u dr re de in un con dis mac net non out pro sub anti
215
TABLE B-14 PRTK and DNA Common Prefixes mrs over 2b poly co post bio semi mis tele pre #1 non-
216
To understand how Password Recovery Toolkit (PRTK) 6.5 and Distributed Network Attack (DNA) 3.5 search for the different password combinations available for application files, you need to be familiar with the underlying elements and classifications of encryption and password technology.
217
password that produces the identical key. The program uses the key and a reverse algorithm to decrypt the file. Figure C-1 Understanding the File Encryption Process
Decryption Attack: Decrypts the password that locks the file. Dictionary Attack: Uses the words in a dictionary, applies Rules to the words, and
converts the possible words into keys.
218
Keyspace Attack: Tries every possible key because there is a finite number of keys
for the file.
The possible number of keys can be very large, but with enough computing power, it
is possible to try every key.
Reset: Rewrites the key that opens the file to a key that comes from a password that
you specify.
DECRYPTION ATTACK
The decryption attack looks for the password that locks the file. In the files that PRTK uses the decryption attack on, the password is protected or scrambled with a known key. The password is then stored in the file itself.
PRTK knows the key that encrypts the password because the application uses the same key each time. (Each application in the decryption attack category uses a different key.) PRTK knows the location of the encrypted password in the file, applies the key to it, and then decrypts the password.
DICTIONARY ATTACK
PRTK tries to find the passwords of these documents, because an exhaustive key search
takes an unreasonable amount of time. Most people use passwords that they can remember. If you limit a set of passwords to a language they speak or other biographical data of the people, there is a good chance of finding the password in a reasonable time frame. The language, biographical data, and other information is stored in dictionaries. PRTK uses dictionaries to try to find a password. Rules are applied to the words in a dictionary to further attempt password recovery. For example, one Rule is a primary search using the dictionaries. The primary search includes the words with all lower-case letters, all capital letters, one capital letter followed by all lower-case letters, and one lower-case letter followed by all capital letters, such as hello, Hello, HELLO, hELLO etc. When PRTK discovers a password, it adds it automatically to a Golden Dictionary. Each time a new password is added, the updated Golden Dictionary is applied to the
219
jobs in the job queue. If there are jobs with duplicate passwords, PRTK automatically discovers them by using the Golden Dictionary.
KEYSPACE ATTACK
The keyspace attack is typically used on applications that use 40-bit encryption or less. In 32-bit encryption applications, such as WinZip 6.08.1, there is a limit to the number of keys that can be stored. The limit is the largest number that can be represented with 32 bits. This number might seem extremely large; but it is actually small enough that, with enough computing power, you can decrypt an encrypted document in a reasonable amount of time. So with certain applications, PRTK generally finds the key for an encrypted document rather than the password because there are a relatively small number of keys that can be created, and key recovery is guaranteed.
RESET ATTACK
In the reset attack, two types of keys are associated with an encrypted file: one key that encrypts the password for the file and one key that actually encrypts the file. The reset attack usually rewrites the key that encrypts the file to a key that comes from a known password.
SYMMETRIC ENCRYPTION
In symmetric encryption, the encryption and decryption keys are the same. Some common symmetric encryption systems are:
220
deep crack, and it can be broken with a distributed network of computers. TripleDES (3DES) can be used with two keys (EDE2 112-bit) or three keys (EDE3 168-bit).
Pretty Good Privacy (PGP) is used for sending secure email. It provides both
confidentiality and authentication.
BestCrypt can be used with any of the following Hash functions and encryption
algorithms: GOST and SHA Hash; GOST, DES, Blowfish, IDEA, Twofish, CAST, AES, RC6, and 3DES encryption.
Advanced Encryption Standard (AES) has replaced DES as the encryption standard.
It uses a 128-, 192-, or 256-bit key.
RC4
RC4 is a variable key-length stream cipher designed by RSA. Microsoft Word and Excel use RC4 and a 40-bit key to encrypt their files. Keys this small can be easily broken by governments, criminals, and amateurs.
ASYMMETRIC ENCRYPTION
In asymmetric encryption, the encryption and decryption keys are different. Asymmetric encryption uses a public key (which can be posted on an Internet site or made public through other means) and a private key, which remains secret. In this system, something that has been encrypted with the private key can only be decrypted by the public key, and vice versa. Asymmetric algorithms are slower than symmetric algorithms, but can nonetheless be very useful. They are often used in combination with symmetric algorithms. The number of possible key values refers to the actual number of different key words or passwords that can exist, based on the particular algorithm used to create the key value in question. This number can be calculated as follows: an n-bit key has 2n possible values. For example, a 40-bit key has 240 possible values, or approximately one trillion possibilities. The security of an algorithm should rely on the secrecy of the key only, not the secrecy of the algorithm.
221
HASHING
Hashing is used to determine whether a file has changed. Producing two different items with the same hash value is computationally improbable since changing a single bit in a file results in a completely different hash. Therefore, hashes can function as a type of digital fingerprint that can be used to verify data integrity. Before PRTK begins a password recovery, it automatically creates SHA and MD5 hash values for the files to be recovered. After a password is recovered, you can verify the hash values of a file providing proof that the contents of the file were not changed during the recovery of the files password.
PRTK uses two different hashing methods.
222
This chapter identifies key program files, their locations, and their functions for Password Recovery Toolkit (PRTK) 6.5 and for Distributed Network Attack (DNA)3.5.
PRTK FILES
The following table details the filenames, their default locations, and their functions in a PRTK system.
TABLE D-1 PRTK Paths, Filenames, and Functions
Filename
*.adf
Directory Location
[drive]:\documentsand settings\allusers\ applicationdata\ AccessData\PR\ Dictionaries
Function
A dictionary file. Codepage dictionaries have c appended to the filename. Unicode dictionaries haveuappended to the filename. When a Biographical Dictionary is generated, three files are created, the two *.adf files, and one .xml file. The .xml file contents cannot be viewed as the .adf files can. A Biographical Dictionary preserves the case of alpha characters.
223
Filename
*.profile
Directory Location
Function
[drive]:\documentsand A profile file, which contains settings\allusers\ information about the dictionaries applicationdata\ and Rules used to decrypt files. AccessData\PR\ Profiles [drive]:\Program Files\AccessData\PRTK 6\ Supervisor\bin A directory containing a portion of the Java Runtime Environment, which runs PRTK.
\bin directory
\data directory
[drive]:\Documentsand The directory that contains the PRTK Settings\AllUsers\ database files. ApplicationData\ AccessData\PR\dnadata [drive]:\documentsand The directory that contains the settings\allusers\ dictionaries used by PRTK. applicationdata\ AccessData\PR\ Dictionaries [drive]:\documentsand A file added after the installation that settings\allusers\ contains all passwords recovered by applicationdata\ PRTK. AccessData\PR\ Dictionaries [drive]:\documentsand The directory that contains the settings\allusers\ password recovery Rules used by applicationdata\ PRTK. AccessData\PR\levels [drive]:\Program Files\AccessData\PRTK 6\ Supervisor\lib A directory containing a portion of the Java Runtime Environment, which runs PRTK.
\Dictionaries directory
GoldenDictionary
\Rules directory
\lib directory
\Modules directory
[drive]:\documentsand The directory that contains the settings\allusers\ application modules supported by applicationdata\ PRTK. AccessData\PR\ Modules
224
Filename
\Profiles directory
Directory Location
Function
[drive]:\documentsand The directory that contains the settings\all profiles used by PRTK. users\application data\AccessData\PR\ Profiles C:\ProgramFiles\ AccessData\PRTK6\ Supervisor The Dictionary Utility program.
ad_dictutility.jar
Filename
*.adf
Directory Location
[Drive]:\Documentsand Settings\AllUsers\ ApplicationData\ AccessData\PR\dictionarie s
Function
A dictionary file. Codepage dictionaries have c appended to the filename. Unicode dictionaries have u appended to the filename. When a Biographical Dictionary is generated, three files are created, the two .adf files, and one .xml file. The .xml file contents cannot be viewed as the .adf files can. A Biographical Dictionary preserves the case of alpha characters.
*.profile
A profile file, which contains information about the dictionaries and Rules used to decrypt files. A directory used by the Java Virtual Machine, which runs DNA.
\bin directory
225
Filename
\datadirectory
Directory Location
[Drive]:\Documentsand Settings\AllUsers\ ApplicationData\ AccessData\PR\dnadata
Function
The directory that contains the DNA database files.
\Dictionaries directory [Drive]:\Documentsand The directory that contains the Settings\AllUsers\ dictionaries used by DNA. ApplicationData\ AccessData\PR\dictionarie s generate_keys.exe [Drive]:\ProgramFiles\ AccessData\DNA3\ Supervisor [Drive]:\ProgramFiles\ AccessData\DNA3\ Supervisor A file used by the DNA installation program to create encrypted communication between the supervisor and worker. A file used by the DNA installation program to create the DNA Worker installation files available in the Supervisor directory.
generate_worker_ install.exe
GoldenDictionary
[Drive]:\Documentsand A file added after the installation Settings\AllUsers\ that contains all passwords recovered by the DNA Supervisor. ApplicationData\ AccessData\PR\dictionarie s [Drive]:\Documentsand Settings\AllUsers\ ApplicationData\ AccessData\PR\levels [Drive]:\ProgramFiles\ AccessData\DNA3\ Supervisor\lib [Drive]:\Documentsand Settings\AllUsers\ ApplicationData\ AccessData\PR\Modules [Drive]:\Documentsand Settings\AllUsers\ ApplicationData\ AccessData\PR\profiles The directory that contains the password recovery Rules used by DNA. A directory used by the Java Virtual Machine, which runs DNA. The directory that contains the application modules supported by DNA. The directory that contains the profiles used by DNA.
\Rules directory
\libdirectory
\Modulesdirectory
\Profiles directory
226
Filename
prefs.dat
Directory Location
[Drive]:\Documentsand Settings\AllUsers\ ApplicationData\ AccessData\PR
Function
A file added after the installation that holds preferences, including the option to decrypt the file after key recovery and the dimensions of the DNA management interface. The DNA Supervisor program. You manage the DNA Supervisor from the management interface. The Supervisor.ini file is where the keys are stored.
Supervisor_service.ex [Drive]:\ProgramFiles\ e AccessData\DNA3\ Supervisor and Supervisor.ini user_defined.xml [Drive]:\Documentsand Settings\AllUsers\ ApplicationData\ AccessData\PR\levels [Drive]:\Documentsand Settings\AllUsers\ ApplicationData\ AccessData\PR
The file that contains information about each Rule that you have created. The DNA Worker program. This file is only added to this directory if the DNA Worker is installed on the same machine as the supervisor. The DNA Worker installation program for Linux machines. A file used by the DNA installation program to create the services needed by the DNA Worker installation files available in the Supervisor directory. The DNA Worker installation program for Macintosh machines. The DNA Worker installation program for PowerPC machines.
worker.ini
workermacinstall.sh
worker-powerpcinstall.sh
227
Filename
*.adf
\bindirectory
C:\ProgramFiles\ AccessData\DNA3\ Worker\bin C:\ProgramFiles\ AccessData\DNA3\ Worker\lib C:\Program Files\ AccessData\DNA 3\ Worker
A directory used by the Java Virtual Machine, which runs DNA Worker. A directory used by the Java Virtual Machine, which runs DNA Worker. The DNA Worker User Interface program. On the DNA Worker machine, you can check statistics as they are updated, and you can stop and restart the worker from the DNA Worker interface. The file that contains configuration information about the worker, including its supervisor hostname and IP address. A service needed by the DNA Worker. This service must be running in order to process jobs on the DNA Worker. The Dictionary Utility program.
\libdirectory
worker.exe
Worker.ini
C:\Documents and Settings\All Users\ Application Data\ AccessData\PR C:\ProgramFiles\ AccessData\DNA3\ Worker C:\ProgramFiles\ AccessData\DNA3\ Supervisor
worker_service.exe
ad_dictutility.jar
228
On Windows 2000 and Windows XP systems, Microsofts encrypted file system (EFS) allows you to encrypt a single file or to automatically encrypt all files saved to a particular folder. You dont have to remember passwords because Windows encrypts the data using your login password. You must use FTK to decrypt EFS-encrypted files to get the SYSKEY. PRTK recovers EFS files by retrieving your login password from the EFS master key file ([drive]:\DocumentsandSettings\user\ApplicationData\Protect\user_SID). Ultimately, this recovery performs the same function as the SAM file attack. Recovering the user login password from the SAM file can be faster than recovering the login password from the EFS master key file. Use the SAM file to recover the users login password.
Note: When used in conjunction with PRTK, FTK1.50b and above has an option to automatically decrypt EFS files. Essentially, FTK sends PRTK the EFS master key file along with any other EFS-related keys. PRTK then performs an EFS attack to obtain the user login password. FTK and PRTK must be running on the same dongle on the same machine to support this integrated functionality.
229
requested.
3. After obtaining the login password, start FTK. 4. In FTK, select Tools > Enter EFS Password. 5. Click OK. 6. Enter the password. FTK decrypts the EFS passwords if the login password obtained from the SAM and SYSTEM files is valid. If FTK cannot decrypt the EFS passwords, either the login password has been changed after the SAM and SYSTEM files were obtained or the EFS
Important: If there are multiple users on a workstation, you must have all user login passwords to increase chances of decrypting the files. EFS files could have been encrypted by more than one of the users. FTK and PRTK must be running on the same dongle on the same machine to support this integrated functionality.
OTHER NOTES
In Windows 2000, every file is also encrypted with the Recovery Agent's EFS public key. The Administrator user is the default Recovery Agent for computers that are not a part of a domain. If the computer is joined to a Windows 2000 domain, the Domain Administrator user is the default Recovery Agent. In Windows XP, the Recovery Agent is optional. Certain files cannot be encrypted:
System files NTFS compressed files Files in %Systemroot% and its subdirectories
230
AccessData Glossary
A
AccessData Recovery Session
In PRTK, selecting one or more files and starting the password recovery process is called an AccessData Recovery (ADR) session. Typically, each case has one session unless you have a large number of encrypted files.
Address
A location of data, usually in main memory or on a disk. You can think of computer memory as an array of storage boxes, each of which is one byte in length. Each computer has an address (a unique number) assigned to it. By specifying a memory address, programmers can access a particular byte of data. Disks are divided into tracks and sectors, each of which has a unique address.
Application Administrator
The first user created in an AccessData FTK2 system. The Application Administrator has all rights within the application, including adding users and assigning roles. Application Administrators can assign the role of Application Administrator to new users as they are created.
AccessData Glossary
231
Asymmetric Encryption
A type of encryption in which the encryption and decryption keys are different. Asymmetric encryption uses a public key (which can be posted on an Internet site or made public through other means) and a private key, which remains secret. In this system, something that has been encrypted with the private key can be decrypted only by the public key, and vice versa. Asymmetric algorithms are slower than symmetric algorithms, but can nonetheless be very useful. They are often used in combination with symmetric algorithms, as with EFS Encryption. The number of possible key values refers to the actual number of different key words or passwords that can exist, based on the particular algorithm used to create the key value in question. A n-bit key has 2n possible values. For example, a 40-bit key has 240 possible values, or 1,099,511,627,776 possibilities. The security of an algorithm should rely on the secrecy of the key only, not the secrecy of the algorithm. Do not compare key sizes between symmetric and asymmetric algorithms. For example, a 128-bit symmetric key is approximately as strong as a 512-bit asymmetric key.
B
BestCrypt
A common symmetric encryption system that can be used with any of the following hash functions and encryption algorithms:
Blowfish
IDEA
Twofish
CAST AES RC6 3DES encryption
232
Binary
Pertaining to a number system that has just two unique digits. Computers are based on the binary numbering system, which consists of just two unique numbers, 0 and 1. All operations that are possible in the decimal system (addition, subtraction, multiplication, and division) are equally possible in the binary system.
BIOS
Acronym for Basic Input/Output System. The BIOS is built-in software that determines what a computer can do without accessing programs from a disk. On PCs, the BIOS contains all the code required to control the keyboard, display screen, disk drives, serial communications, and a number of miscellaneous functions.
Bit-stream Image
See Forensic Image on page 238.
Bookmark
A menu entry or icon on a computer that is most often created by the user and that serves as a shortcut to a previously viewed location (as an Internet address). The term bookmark as used in a Computer Crimes Unit report refers to locating a file, folder or specific item of interest to the examiner or to the investigator. The location of the data (file name, file location, relative path, and hardware address) is identified. Other data can be addressed as well.
Boot
To load the first piece of software that starts a computer. Because the operating system is essential for running all other programs, it is usually the first piece of software loaded during the boot process.
Boot Record
All the three types of FAT have a boot record, which is located within an area of reserved sectors. The DOS format program reserves 1 sector for FAT12 and FAT16 and usually 32 sectors for FAT32.
AccessData Glossary
233
C
Chunk Size
The number of passwords the supervisor machine can process in the amount of time specified.
Cluster
Fixed-length blocks that store files on the FAT media. Each cluster is assigned a unique number by the computer operating system. Only the part of the partition called the data area is divided into clusters. The remainder of the partition are defined as sectors. Files and directories store their data in these clusters. The size of one cluster is specified in a structure called the Boot Record, and can range from a single sector to 128 sectors. The operating system assigns a unique number to each cluster and the keeps track of files according to which cluster they use.
CMOS
Short for Complementary Metal Oxide Semiconductor. Pronounced SEE-moss, CMOS is a widely used type of semiconductor. CMOS semiconductors use both NMOS (negative polarity) and PMOS (positive polarity) circuits. Since only one of the circuit types is on at any given time, CMOS chips require less power than chips using just one type of transistor. This makes them particularly attractive for use in battery-powered devices, such as portable computers. Personal computers also contain a small amount of battery-powered CMOS memory to hold the date, time, and system setup parameters.
CRC
Short for Cyclical Redundancy Check. It performs a complex calculation on every byte in the file, generating a unique number for the file in question. If so much as a single byte in the file being checked were to change, the cyclical redundancy check value for that file would also change. If the CRC value is known for a file before it is downloaded, you can compare it with the CRC value generated by this software after the file has been downloaded to ascertain whether the file was damaged in transit. The odds of two files having the same CRC value are even longer than the odds of winning a state-run lotteryalong the lines of one in 4,294,967,296.
Cylinder
234
A single-track location on all the platters making up a hard disk. For example, if a hard disk has four platters, each with 600 tracks, then there will be 600 cylinders, and each cylinder will consist of 8 tracks (assuming that each platter has tracks on both sides).
D
dd
(Linux) Makes a copy of a input file (STDIN) using the specified conditions, and sends the results to the output file (STDOUT).
Data Carving
Data carving is the process of extracting a collection of data from a larger data set. Data carving techniques frequently occur during a digital investigation when the unallocated file system space is analyzed to extract files. The files are carved from the unallocated space using file type-specific header and footer values. File system structures are not used during the process.
Device
Any machine or component that attaches to a computer. Examples of devices include disk drives, printers, mice, and modems. These particular devices fall into the category of peripheral devices because they are separate from the main computer. Most devices, whether peripheral or not, require a program called a device driver that acts as a translator, converting general commands from an application into specific commands that the device understands.
Dictionary Attack
AccessData Glossary
235
The dictionary attack is used on applications with encryption stronger than 40-bit. PRTK uses this method to recover passwords
Disk
A round plate on which data can be encoded. There are two basic types of disks: magnetic disks and optical disks.
E
EnScript (also e script)
EnScript is a language and API that has been designed to operate within the EnCase environment. EnScript is compatible with the ANSI C++ standard for expression evaluation and operator meanings but contains only a small subset of C++ features. In other words, EnScript uses the same operators and general syntax as C++ but classes and functions are organized differently.
Evidence Item
A physical drive, a logical drive or partition, or drive space not included in any partitioned virtual drive.
F
File Allocation Table (FAT)
A table that the operating system uses to locate files on a disk. A file may be divided into many sections that are scattered around the disk. The FAT keeps track of all these pieces.
236
There is a field in the Boot Record that specifies the number of FAT copies. With FAT12 and FAT16, MS-DOS uses only the first copy, but the other copies are synchronized. FAT32 was enhanced to specify which FAT copy is the active one in a 4bit value part of a Flags field. Think of the FAT as a singly linked list. Each of the chains in the FAT specify which parts of the disk belong to a given file or directory. A file allocation table is a simple array of 12-bit, 16-bit, or 32-bit data elements. Usually there will be two identical copies of the FAT.
FAT12: The oldest type of FAT uses a 12-bit binary number to hold the cluster number.
A volume formatted using FAT12 can hold a maximum of 4,086 clusters, which is 212 minus a few values (to allow for reserved values to be used in the FAT). FAT12 is most suitable for very small volumes, and is used on floppy disks and hard disk partitions smaller than about 16 MB (the latter being rare today.)
FAT16: The FAT used for older systems, and for small partitions on modern systems, uses a 16-bit binary number to hold cluster numbers. When you see someone refer to a FAT volume generically, they are usually referring to FAT16, because it is the de facto standard for hard disks, even with FAT32 now more popular than FAT16. A volume
using FAT16 can hold a maximum of 65,526 clusters, which is 216 less a few values (again for reserved values in the FAT). FAT16 is used for hard disk volumes ranging in size from 16 MB to 2,048 MB. VFAT is a variant of FAT16.
FAT32: The newest FAT type, FAT32 is supported by newer versions of Windows, including Windows 95s OEM SR2 release, as well as Windows 98, Windows ME, and Windows 2000. FAT32 uses a 28-bit binary cluster numbernot 32 because 4 of the 32 bits are reserved. 28 bits is still enough to permit very large volumesFAT32 can theoretically handle volumes with over 268 million clusters, and will theoretically support drives up to 2 TB in size. To do this, however, the size of the FAT grows very large. VFAT features the following key improvements compared to FAT12 and FAT16:
Long File Name Support: Prior to Windows 95, FAT was limited to the elevencharacter (8.3) file name restriction. VFATs most important accomplishment enabled the use of long file names by the Windows 95 operating system and applications written for it, while maintaining compatibility with older software that had been written before VFAT was implemented.
AccessData Glossary
237
Improved Performance: The disk access and file system management routines for
VFAT were rewritten using 32-bit protected-mode code to improve performance. At the same time, 16-bit code was maintained, for use when required for compatibility.
Better Management Capabilities: Special support was added for techniques like
disk locking to allow utilities to access a disk in exclusive mode without fear of other programs using it in the meantime.
File Header
The data at the beginning of a file that identifies the file type: .gif, .doc, .txt, etc.
File Footer
The data at the end of the file signifying the file is complete and allows the file to be understood by the operating system.
File Item
Any item FTK can parse from the evidence. This includes complete files as well as subelements such as graphics, files, or OLE objects embedded in other files; deleted items recovered from unallocated space; and so forth.
File Slack
Unused space. Operating systems store files in fixed-length blocks called clusters. Because few files are a size that is an exact multiple of the cluster size, there is typically unused space between the end of the file and the end of the last cluster used by that file.
Forensic Image
A process where all areas of a physical disk are copied, sector by sector, to storage media. This image may be a raw file, as in the case of the Linux utility DD, or it may be a forensically correct copy, such as SPADA provides. These images replicate exactly all sectors on a given storage device. All files, unallocated data areas, and areas not normally accessible to a user are copied.
238
G
Graphic Image Files
AccessData Glossary 239
Computer graphic image files such as photos, drawings, etc. Come in various standard formats. Some of the most common file types include but are not limited to Joint Photographic Experts Group (JPEG, JPG), Bitmap (BMP), Graphics Interchange Format (GIF, JFIF) and AOL image file (ART).
Golden Dictionary
The Golden Dictionary file, ADPasswords.dat, contains all recovered passwords for all PRTK sessions on the current computer. It is stored in the AccessData program directory (C:\ProgramFiles\AccessData\Recovery\). Recovered passwords are used as the first level of attack in all password recovery sessions. Most people use the same password for different files, so recovering the password for a simple file often opens the door to more difficult files.
H
Hard Disk (Drive)
A magnetic disk on which you can store computer data. The term hard is used to distinguish it from a soft or floppy disk. Hard disks hold more data and are faster than floppy disks. A hard disk, for example, can store anywhere from 10 megabytes to several gigabytes, whereas most floppies have a maximum storage capacity of 1.4 megabytes.
Hashing
Generating a unique alphanumeric value based on a files contents. The alphanumeric value can be used to prove that a file copy has not been altered in any way from the original. It is statistically impossible for an altered file to generate the same hash number.
Head
240
The mechanism that reads data from or writes data to a magnetic disk or tape. Hard disk drives have many heads, usually two for each platter.
Hexadecimal
The base-16 number system, which consists of 16 unique symbols: the numbers zero through nine and the letters A to F. For example, the decimal number 15 is represented as F in the hexadecimal numbering system. The hexadecimal system is useful because it can represent every byte (eight bits) as two consecutive hexadecimal digits. It is easier for humans to read hexadecimal numbers than binary numbers.
L
Legal Matter
Legal Matters are titles given to collections of electronic data to be used as evidence in a court of law against someone suspected of illegal activity. Legal Matters can be actual lawsuits or suspect activity.
Logical Disk
M
Markov Permutation
The Markov permutation records the times certain words, letters, punctuation, and spaces occur together in a given amount of text, then generates random output that has the same distribution of groups. For example: if you were to scan through the text and create a huge frequency table of what words come after the words up the, you might find tree, ladder, and creek most often. You would then generate output from the words up the, and get the results up the tree, up the creek, and up the ladder randomly.
AccessData Glossary
241
If the words up the were followed most frequently by the word creek in your sample text, the phrase up the creek would occur most frequently in your random output. Andrey Andreyevich Markov (June 14, 1856July 20, 1922) was a Russian mathematician.
Memory
Internal storage areas in the computer. The term memory identifies data storage that comes in the form of chips; the word storage is used for memory that exists on tapes or disks. Moreover, the term memory is usually used as shorthand for physical memory, which refers to the actual chips capable of holding data.
Message Digest 5
A 128-bit digital fingerprint based on a file's content. An algorithm created in 1991 by Professor Ronald Rivest of RSA that is used to create digital signatures, or a 128-bit digital fingerprint based on a file's content. Message Digest 5 (MD5) takes as input an arbitrary-length file and outputs a fixed-length number referred to as a hash or digest. It is intended for use with 32 bit machines and is safer than the MD4 algorithm, which has been broken. MD5 is a one-way hash function, meaning that it takes a message and converts it into a fixed string of digits, also called a message digest. When using a oneway hash function, one can compare a calculated message digest against the message digest that is decrypted with a public key to verify that the message hasnt been changed. This comparison is called a hash check. The number is derived from the input in such a way that it is computationally infeasible to derive any information about the input from the hash. It is also computationally infeasible to find another file that will produce the same output.
MD5 hashes are used by the KFF to identify known files.
Metadata
Literally data about data. Metadata describes how, when, and by whom a particular set of data was collected and how the data is formatted. Metadata is essential for understanding information stored in data warehouses and has become increasingly important in XML-based Web applications.
Mount
242
To make a mass storage device available to the OS, or to a user or user group. In may also mean to make a device physically accessible. In a Unix environment, the mount command attaches discs or directories logically rather than physically. The Unix mount command makes a directory accessible by attaching a root directory of one file system to another directory, which makes all the file systems usable as if they were subdirectories of the file system they are attached to. Unix recognizes devices by their location, while Windows recognizes them by their names (C: drive, for example). Unix organizes directories in a tree-like structure in which directories are attached by mounting them on the branches of the tree. The file system location where the device is attached is called a mount point. Mounts may be local or remote. A local mount connects disk drives on one machine so that they behave as one logical system. A remote mount uses Network File System (NFS) to connect to directories on other machines so that they can be used as if they were all part of the users file system.
N
NT File System (NTFS)
One of the file systems for the Windows NT operating system (Windows NT also supports the FAT file system). NTFS has features to improve reliability, such as transaction logs to help recover from disk failures. To control access to files, you can set permissions for directories or individual files. NTFS files are not accessible from other operating systems, such as DOS. For large applications, NTFS supports spanning volumes, which means files and directories can be spread out across several physical disks.
P
Pagefile (.sys)
The paging file is the area on the hard disk that Windows uses as if it were random access memory (RAM). This is sometimes known as virtual memory. By default, Windows stores this file on the same partition as the Windows system files.
AccessData Glossary
243
R
RC4
RC4, or ARC4, is a variable key-length stream cipher designed by RSA. Stream ciphers are key-dependent, pseudo-random number generators whose output is XORed with the data <plaintext> XOR <random-looking stream> = <random-looking ciphertext>. Because XOR is symmetric (in other words, [A XOR B] XOR B = A), XORing the ciphertext with the stream again returns the plaintext. Microsoft Word and Excel use RC4 and a 40-bit key to encrypt their files. An exhaustive key space attack has a much better chance at succeeding with a 40-bit key space.
S
Sector
A sector is a group of bytes within a track and is the smallest group of bytes that can be addressed on a drive. There are normally tens or hundreds of sectors within each track. The number of bytes in a sector can vary, but is almost always 512. The maximum number of sectors in a cluster is 64. CDROMS normally have 2048 bytes per sector. Sectors are numbered sequentially within a track, starting at 1. The numbering restarts on every track, so that track 0, sector 1 and track 5, sector 1 refer to different sectors. Modern drives use a system known as Logical Block Addressing (LBA) instead of CHS to track sectors. During a low-level format, hard disks are divided into tracks and sectors. The tracks are concentric circles around the disk and the sectors are segments within each circle. For example, a formatted disk might have 40 tracks, with each track divided into ten sectors.
244
Physical sectors are relative to the entire drive. Logical sectors are relative to the partition.
SHA
The SHA (Secure Hash Algorithm) family is a set of related cryptographic hash functions. The most commonly used function in the family, SHA-1, is employed in a large variety of popular security applications and protocols, including TLS, SSL, PGP, SSH, S/MIME, and IPSec. SHA-1 is considered to be the successor to MD5, an earlier, widely-used hash function. The SHA algorithms were designed by the National Security Agency (NSA) and published as a US government standard. The first member of the family, published in 1993, is officially called SHA; however, it is often called SHA-0 to avoid confusion with its successors. Two years later, SHA-1, the first successor to SHA, was published. Four more variants have since been issued with increased output ranges and a slightly different design: SHA-224, SHA-256, SHA-384, and SHA-512sometimes collectively referred to as SHA-2. Attacks have been found for both SHA-0 and SHA-1. No attacks have yet been reported on the SHA-2 variants, but since they are similar to SHA-1, researchers are worried, and are developing candidates for a new, better hashing standard.
AccessData Glossary
245
The most common spooling application is print spooling. In print spooling, documents are loaded into a buffer (usually an area on a disk), and then the printer pulls them off the buffer at its own rate. Because the documents are in a buffer where they can be accessed by the printer, you can perform other operations on the computer while printing takes place in the background. Spooling also lets you place a number of print jobs on a queue instead of waiting for each one to finish before specifying the next one.
downloaded or copied during work sessions that have occurred since the computer was last booted. Thus, if the computer has not been shut down for several days, the data stored in file slack can come from work sessions that occurred in the past.
RAM slack pertains only to the last sector of a file. If additional sectors are needed to round out the block size for the last cluster assigned to the file, then a different type of slack is created. It is called drive slack and it is stored in the remaining sectors which might be needed by the operating system to derive the size needed to create the last cluster assigned to the file. Unlike RAM slack, which comes from memory, drive slack is padded with what was stored on the storage device before. Such data could contain remnants of previously deleted files or data from the format pattern associated with disk storage space that has yet to be used by the computer.
246
For example, take a file that is created by writing the word Hello. Assuming that this is the only data written in the file and assuming a two sector cluster size for the file, the data stored to disk and written in file slack could be represented as follows: ________________________________________ Hello+++++++|(EOC) RAM Slack is indicated by + Drive Slack is indicated by ________________________________________ File Slack is created at the time a file is saved to disk. When a file is deleted under DOS, Windows, Windows 95, Windows 98 and Windows NT/2000/XP, the data associated with RAM slack and drive slack remains in the cluster that was previously assigned to the end of the deleted file. The clusters which made up the deleted file are released by the operating system and they remain on the disk in the form of unallocated storage space until the space is overwritten with data from a new file. File slack potentially contains data dumped randomly from the computers memory. It is possible to identify network login names, passwords, and other sensitive information associated with computer usage. File slack can also be analyzed to identify prior uses of the subject computer and such legacy data can help the computer forensics investigator. File slack is not a trivial item. On large hard disk drives, file slack can involve several hundred megabytes of data. Fragments of prior email messages and word processing documents can be found in file slack. From a computer forensic standpoint, file slack is very important as both a source of digital evidence and security risks
String Searches
A string search is a data string containing standard text or non-text data. The term may be a word, phrase or an expression. Keyword searches are designed to aid in the identification of potentially relevant data on the examined media.
Superuser Administrator
A person with unlimited access privileges who can perform any and all operations on the computer and within the operating system and file system. These privileges do not necessarily transfer to the applications installed on the computer.
Symmetric Encryption
AccessData Glossary
247
A type of encryption in which the encryption and decryption keys are the same. Some common symmetric encryption systems are Data Encryption Standard, Triple-DES, Pretty Good Privacy, BestCrypt, and Advanced Encryption Standard.
T
Task
Tasks provide investigators and reviewers with a means of tracking the progress of case review. Administrators assign Reviewers specific tasks in the case and a specific group of data. The assigned task allows the reviewer to know which filters to apply to the data set for review.
Thumbnail
A smaller-sized version of a graphics image.
U
Unallocated Space
Also called Unused Disk Area or free space, it consists of all the clusters on a drive that are not currently assigned to a file. Some of these clusters may still contain data from files that have been deleted but not yet overwritten by other files. Until the first file is written to the data storage area of a computer storage device, the clusters are unallocated by the operating system in the File Allocation Table (FAT). These unallocated clusters are padded with format pattern characters and the unallocated clusters are not of interest to the computer forensics specialist until data is written to the clusters. As the computer user creates files, clusters are allocated in the File Allocation Table (FAT) to store the data. When the file is deleted by the computer user, the clusters allocated to the file are released by the operating system so new files and data can be stored in the clusters when needed. However, the data associated with the deleted file remains behind. This data storage area is referred to as unallocated storage space and it is fragile from an evidence preservation standpoint. However, until the unallocated storage space is reassigned by the operating system, the data remains behind for easy discovery and extraction by the computer forensics specialist. Unallocated file space
248
potentially contains intact files, remnants of files and subdirectories and temporary files, which were transparently created and deleted by computer applications and also the operating system. All of such files and data fragments can be sources of digital evidence and also security leakage of sensitive data and information.
URL
Abbreviation of Uniform Resource Locator, the global address of documents and other resources on the World Wide Web. The first part of the address indicates what protocol to use and the second part specifies the IP address or the domain name where the resource is located.
User
Those who use AccessData computer forensic programs to collect, review, and process data for legal cases are called Users. An Administrator or user with administrative rights can create users and designate their roles and user rights.
V
Volume
A volume refers to a mounted partition. There may be only one volume on a disk, such as a floppy disk or a zip disk. There may be several volumes on a disk as on a partitioned hard drive. A volume is a logical structure, not a physical device. There can be up to 24 of these logical volumes on a disk and they show up as drive c, d, or e in DOS.
AccessData Glossary
249
250