Secure Communications With Encryption

Securing modern communications in the internet require encryption. Existing electronic communication systems can be eavesdropped by a variety of parties. Examples of those parties are employers, ISPs, law enforcement agencies and national security agencies. Many of the communication systems (email, instant messaging) communicate in the internet without using any encryption or user cannot affect the …

Brute Force Dictionary Attack Against BitLocker

First of all, brute forcing BitLocker drive with adequate password is definitely a no go. Modern CPU / GPU based attack vectors will take stellar amount of time to break the encryption. But if you still want to hit your head to the wall, be my quest!

Inspecting BitLocker encrypted drive in Kali Linux

In this blog post we are inspecting the BitLocker encrypted drive we encrypted in part 2 using Kali Linux. In this tutorial we have booted the Kali Linux in Live CD/USB mode without persistent storage. We are going to use the Dislocker tool to inspect the encrypted BitLocker drive/partition. Installing the Dislocker tool Although Kali …

How to keep your data safe from bad guys? Implementing VeraCrypt – Part 3

Encrypting hard disks after VeraCrypt installation is quite trivial procedure. At first you need to start the encryption wizard by selecting System -> Encrypt System Partition/Drive.

How to keep your data safe from bad guys? – Implementing BitLocker – Part 2

Checking TPM-Module When implementing BitLocker you need to first check if the computer has the TPM-module. In Windows 10 you can check that by writing “tpm.msc” in the search box.

How to keep your data safe from bad guys? Part 1

Losing a mobile device or theft can have serious consequences to a private individual or to a company. It’s almost always guaranteed that mobile device operating system can be compromised if attacker has physical access to the device and the device hard disks are not encrypted. In these kind of scenarios only guaranteed method of …