Im having an argument with a client; hopefully HN can make sure I am the sane one.
He's basically lost the password to his laptop - the issue is he has lost the SafeBoot password. Which is full disk encryption as I am sure you know.
So, I tell him this and say "sorry I am not going to waste my cluster time trying to break AES encryption" :)
But he claims that it can be done because another consultant says there is a dictionary attack tool going about.
Now I am not completely stupid but I cant find and have never heard of such a tool. Finding naughty programs like that is not usually a problem but my usual resources turned up blank
I had a minor play with the SafeBoot boot sectors (argh, hacking that stuff is fun for some I know, but bah!). I also gave it a bit of cluster time (after tracking down a reasonably performing AES256 implentation) but no joy (tbh I think my "solution" test was wrong).
So. Sanity check: I am right in saying no such tool exists?
I am not familiar with this product and may be wrong...but it seems as though this password is entered before the OS is booted. The only code that runs before that point is in the MBR (http://en.wikipedia.org/wiki/Master_boot_record). The maximum length of code is 446 bytes. Disassembling this amount of code should be trivial for a hacker.
Additionally, it makes no sense to break AES256 as other have pointed out, but there is no reason to do so. Presumably, the encryption software must know the key to decrypt the drive in order to boot (I'm assuming). So the key has to be in long-term storage (ie. on the hd itself) in some form or another.
If one were so inclined, it would seem that the easiest approach would be to disassemble to MBR to determine where it finds the key, and then use the key to decrypt the hd.
I'd love to hear comments if I'm way off. This sounds kinda fun.