Network Security Consulting Agency Since 1989 - Specialized in Unix, Windows, TCP/IP and Internet
Text mode: access to the page content
Hervé Schauer Consultants
You are here: Home > Resources > Lectures > Analysis of the encryption structures provided by BitLocker
Go to: HSC Trainings
Version française
o Skills & Expertise
o Consulting
o ISO 27001 services
o Audit & Assessment
o Penetration tests
o Vunerability assessment (TSAR)
o Forensics
o Training courses
o E-learning
o Agenda
o Past events
o Tutorials
o Thematic index
o Tips
o Lectures
o Courses
o Articles
o Tools (download)
o Vulnerability watch
o Hervé Schauer
o Team
o Job opportunities
o Credentials
o History
o Partnerships
o Associations
   Press and
o HSC Newsletter
o Press review
o Press releases
o Publications
o How to reach us
o Specific inquiries
o Directions to our office
o Hotels near our office
|>|Analysis of the encryption structures provided by BitLocker  
> Access to the content HTML Beginning of the presentation
PDF PDF version [1.4 Mo KB]  
> Description This presentation shows internal but available structures used by a BitLocker encrypted drive : how to find them, how to decompose them and how to translate them. Moreover, the key used for encryption or decryption are listed. Finally, a tool to decrypt BitLocker encrypted drives under Linux or MacOSX is presented : dislocker.
Video: dislocker-fuse.ogv [12 MB]  
> Context & Dates Talk presented during the 2012th edition of the GS-Days, on 3 April 2012.
> Author Romain Coltel (Romain.Coltel@hsc.fr) 
> Type [ French - HTML ]  
> Abstract &
Table of content
Contexte & Objectif
Fonctionnement général de BitLocker
Que fait BitLocker ?
Qu'est-ce qu'il ne fait pas ?
Le coeur de BitLocker : Les méta-données
Accès aux données sur les partitions chiffrées par BitLocker
Algorithmes de chiffrement des données utilisateurs
Les clés utilisées pour le déchiffrement
Vue d'ensemble du disque
Les informations du Bios Parameter Bloc (BPB)
La fragmentation des méta-données
Détail de la partie INFORMATION des méta-données
Détail de la partie VALIDATION des méta-données
Détail de la partie DATASET des méta-données
Détail de la partie DATUM (DATA) des méta-données
Les DATA trouvées dans la partie INFORMATION des méta-données
Les DATA trouvées dans la partie VALIDATION des méta-données
L'implémentation : FUSE & Dislocker
Principe de FUSE
Vidéo de présentation de Dislocker
Questions ?
Hervé Schauer Consultants  
> Related documents
[Presentation]  Linux security characteristics [26 September 2000 - French/English]
[Presentation]  Overview of the main applications of Linux for security [26 April 2000 - French/English]
[Course]  Linux Security
[Presentation]  Skyrack, rop for masses [17 June 2011 - English]
[Presentation]  Linux and security [22 November 2002 - French]
[Presentation]  Some of Linux specificities for security [1 February 2002 - French]
[Presentation]  Linux Kernel Hardening - The useful and the futile in the grsecurity patch [28 January 2002 - French]
[Presentation]  Strengthening the Linux Kernel [6 February 2001 - French]
[Article]  Open-source software and security, the example of Linux [November 2000 - French]
[Tip]  Linux Kernel Modules (LKM): what benefits for administrators? [25 October 2000 - French/English]
[Presentation]  Linux and Security [13 April 2000 - French]
[Course]  Linux Security [9 December 1999 - French]
[Presentation]  Encrypted tunnels with Linux [18 June 1999 - French]
[Presentation]  Specific security characteristics of Linux [18 June 1999 - French]
[Presentation]  Linux for computer security [18 June 1999 - French]
[Presentation]  Linux for Computer Security [24 March 1999 - French]
[Course]  Understanding PKI
[Course]  Data Exchanges Security: IPsec, SSL, SSH
[Course]  Understanding PKI [4 April 2003 - French]
[Course]  Introduction to cryptography [9 February 2001 - French]
[Article]  Random Numbers Generators [February 2000 - French]
[Presentation]  Overview of encryption tools and their use [25 November 1999 - French]
[Techno-watch]  Analyse du produit Security Box Classic [18 March 1999 - French]
[Techno-watch]  Point de vue de la DISSI : les lois françaises sur le chiffrement [3 July 1995 - French]
[Presentation]  Workstation Security [29 March 2007 - French]
[Presentation]  Security and public utilities - interest and set up of free software [19 September 2002 - French]
[Techno-watch]  CanSecWest 2002 Conference [4 May 2002 - French]
[Presentation]  Microsoft & Security: Beware Danger [13 March 2001 - French]
[Techno-watch]  Intranet by Microsoft [14 October 1996 - French]
> Copyright © 2012, Hervé Schauer Consultants, all rights reserved.


Last modified on 13 April 2012 at 11:20:36 CET - webmaster@hsc.fr
Information on this server - © 1989-2010 Hervé Schauer Consultants