I encrypted that then the drive went back.
then below that there is a control="64*************" Since you know a lot about hardware, I have an old Western Digital my passport drive. A user code and user encryption key may be used to access and decrypt the encrypted data within the secure storage device. I got the information from a ui.res (resources) file. So are you talking about hardware encryption?
The only way to know if the correct password has been supplied is to attempt to decrypt the master key then use the decrypted master key to unlock the device.I will do more research. Typically with FDE there are no hashes the password is passed through a key derivation function (KDF) to generate an encryption key, which is used to encrypt the "real" encryption key. (04-21-2015, 06:43 AM)epixoip Wrote: How exactly did you extract these hashes? Did you follow some tutorial or documentation that describes the encryption technology used on this device? If anyone could point me in the right direction, I would be so grateful. I am confused because I thought a salt was a simple phrase that was then combined with your password giving you one hash? I've included a pic. I put them into the Hash-Id and they are SHA-512's. When I was digging around in the Sandiskdrive, I found two hashes. I understand what they are, websites use them all the time because a lot of people use simple passwords. The one thing I am confused about is salts. Needless to say, I might as well have had my neighbor come over and put in a password because I have no idea what it is.
Access to your private vault is protected by a personal password, and your files are automatically encrypted - so even if you share your SanDisk USB flash drive or it becomes lost or stolen, access to your files are safe. Not only did I encrypt it with a password, I did it after I had taken my Ambien. SanDisk SecureAccess v3.02 is a fast, simple way to store and protect critical and sensitive files on SanDisk USB flash drives. Some time ago I encrypted a Sandisk 32 Gb drive. I have been messing with dictionary attacks, combinations and mostly mask attacks. Well, I finally got oclHashcat (cuda) running on The-Distribution-Which-Does-Not-Handle-OpenCL-Well (Kali)-linux.