So I have been playing around with windows EFS lately at work trying various ways to get access to EFS encrypted files and directories. At work we are implementing a new AD structure and looking into using EFS for encrypting sensitive files, from other employees in the office. So, my boss setup a test machine that used the new AD structue, placed an EFS encrypted file on there for me, and told me to do whatever it took to get the file. So upon researching EFS I found that there are 4 main ways to decrypt a file. Be the owner of a file, crack/steal the file owners password, become a domain or local recovery agent, or trick the user into decrypting it for you. I was actually prohibited from cracking or stealing any passwords so that was out of the question. I tryed to become a recovery agent and was able to use social eng. techniques to elevate my self to a domain admin and decrypt the files. But, I also wanted to use a purley technical approach so I also found a nice eliable way to gain access to the files. The machies were unlocked and had no bios password set, so I came in after hours, booted into backtrack and placed the following simple script in the startup directory of all users.
cipher /D /A filenameet
copy filename /mydir/filename
cipher /E /A filename
So if possible the best way to get around EFS if just to have the user decrypt it for you.
Friday, January 23, 2009
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment