<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>ssd vulnerability Archives - Linux Windows and android Tutorials</title>
	<atom:link href="https://www.osradar.com/tag/ssd-vulnerability/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.osradar.com</link>
	<description>tutorials and news and Seurity</description>
	<lastBuildDate>Tue, 06 Nov 2018 08:15:59 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.8.12</generator>
	<item>
		<title>Bypass Hardware Disk Encryption on SSD Drives</title>
		<link>https://www.osradar.com/bypass-hardware-disk-encryption-on-ssd-drives/</link>
					<comments>https://www.osradar.com/bypass-hardware-disk-encryption-on-ssd-drives/#respond</comments>
		
		<dc:creator><![CDATA[osradar_editor]]></dc:creator>
		<pubDate>Tue, 06 Nov 2018 08:15:59 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Hardware]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[ssd]]></category>
		<category><![CDATA[ssd data recovery]]></category>
		<category><![CDATA[ssd hack]]></category>
		<category><![CDATA[ssd tweaks]]></category>
		<category><![CDATA[ssd vulnerability]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=7001</guid>

					<description><![CDATA[<p>Hardware protection is one of the most important parts of today’s computing. It ensures the utmost security on the system, leaving the least possible option for the hacker(s)/crook(s) to get our valuable data. Recently, security researchers found flaws in the popular SSDs that poses a serious threat in data protection. Check out Windows tweaks for [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/bypass-hardware-disk-encryption-on-ssd-drives/">Bypass Hardware Disk Encryption on SSD Drives</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Hardware protection is one of the most important parts of today’s computing. It ensures the utmost security on the system, leaving the least possible option for the hacker(s)/crook(s) to get our valuable data. Recently, security researchers found flaws in the popular SSDs that poses a serious threat in data protection.</p>
<p><a href="https://www.osradar.com/windows-tweaks-for-increasing-ssd-lifetime/">Check out Windows tweaks for saving up your SSD’s write cycles</a>.</p>
<h1>The flaw</h1>
<p><img loading="lazy" class="size-full wp-image-7006 aligncenter" src="https://www.osradar.com/wp-content/uploads/2018/11/broken-ssd.png" alt="" width="960" height="560" srcset="https://www.osradar.com/wp-content/uploads/2018/11/broken-ssd.png 960w, https://www.osradar.com/wp-content/uploads/2018/11/broken-ssd-300x175.png 300w, https://www.osradar.com/wp-content/uploads/2018/11/broken-ssd-768x448.png 768w, https://www.osradar.com/wp-content/uploads/2018/11/broken-ssd-696x406.png 696w, https://www.osradar.com/wp-content/uploads/2018/11/broken-ssd-720x420.png 720w" sizes="(max-width: 960px) 100vw, 960px" /></p>
<p>Using the flaw in the modern, popular SSDs like Samsung and Crucial, security researchers were able to bypass hardware decryption without a password. Carlo Meijer and Bernard van Gastel from Radboud University conducted the research.</p>
<p>They successfully modified the firmware or used a debugging interface to modify the password validation routine in SSD drives and ultimately, decrypt “hardware encrypted” data without password. The test was successful in getting data out of Crucial MX 100, MX 200, MX 300 and Samsung 840 EVO, 850 EVO, T3 Portable, T5 Portable etc.</p>
<p>According to the report, the researchers were able to reverse engineer the firmware of those SSDs. In theory, the hardware encryption was similar to software implementations. In reality, many of those implementations have critical weaknesses as many models allow complete recovery of the data without any knowledge of any secret.</p>
<p>Windows BitLocker is also vulnerable to this issue as it enables hard drive encryption by default.</p>
<h1>How the flaw works</h1>
<p><img loading="lazy" class=" wp-image-7007 aligncenter" src="https://www.osradar.com/wp-content/uploads/2018/11/ssd-flaw.jpg" alt="" width="715" height="476" srcset="https://www.osradar.com/wp-content/uploads/2018/11/ssd-flaw.jpg 626w, https://www.osradar.com/wp-content/uploads/2018/11/ssd-flaw-300x200.jpg 300w" sizes="(max-width: 715px) 100vw, 715px" /></p>
<p>In the case of Crucial MX 100, MX 200 and Samsung T3 Portable, the researchers, using the device’s JTAG debugging interface, successfully modified the password validation routine. Then, the routine would allow access to the data regardless of right/wrong password.</p>
<p><img loading="lazy" class="size-full wp-image-7008 aligncenter" src="https://www.osradar.com/wp-content/uploads/2018/11/jtag-interface.jpg" alt="" width="589" height="416" srcset="https://www.osradar.com/wp-content/uploads/2018/11/jtag-interface.jpg 589w, https://www.osradar.com/wp-content/uploads/2018/11/jtag-interface-300x212.jpg 300w, https://www.osradar.com/wp-content/uploads/2018/11/jtag-interface-100x70.jpg 100w" sizes="(max-width: 589px) 100vw, 589px" /></p>
<p>In the case of Crucial MX 300, researchers had to use a modified firmware as the JTAG debugging interface was disabled by default. After enabling, the same method decrypted the password without any problem.</p>
<p>Samsung 840 EVO and 850 EVO SSDs were a bit difficult to crack. Depending on the SED specification in action, the researchers had to connect to the JTAG debug port or issue a wear-level concern, allowing them to recover the cryptographic secrets required for unlocking the drive.</p>
<h1>How to stay secure</h1>
<p>The SSDs that are currently on the market aren’t secure enough to protect your data once crook(s) get their hands on. Before you dump an SSD, you have to make sure that the drive doesn’t contain any important data.</p>
<p>If you’re using BitLocker, make sure that you disable the hardware encryption feature from “Group Policy Editor”.</p>
<p><img loading="lazy" class="size-full wp-image-7003 aligncenter" src="https://www.osradar.com/wp-content/uploads/2018/11/ssd-1.png" alt="" width="993" height="591" srcset="https://www.osradar.com/wp-content/uploads/2018/11/ssd-1.png 993w, https://www.osradar.com/wp-content/uploads/2018/11/ssd-1-300x179.png 300w, https://www.osradar.com/wp-content/uploads/2018/11/ssd-1-768x457.png 768w, https://www.osradar.com/wp-content/uploads/2018/11/ssd-1-696x414.png 696w, https://www.osradar.com/wp-content/uploads/2018/11/ssd-1-706x420.png 706w" sizes="(max-width: 993px) 100vw, 993px" /></p>
<p>Go to Computer Configuration &gt;&gt; Administrative Templates &gt;&gt; Windows Components &gt;&gt; BitLocker Drive Encryption &gt;&gt; Operating System Drives &gt;&gt; Configure use of hardware-based encryption for operating system drives.</p>
<p><img loading="lazy" class="size-full wp-image-7005 aligncenter" src="https://www.osradar.com/wp-content/uploads/2018/11/ssd-2.png" alt="" width="993" height="591" srcset="https://www.osradar.com/wp-content/uploads/2018/11/ssd-2.png 993w, https://www.osradar.com/wp-content/uploads/2018/11/ssd-2-300x179.png 300w, https://www.osradar.com/wp-content/uploads/2018/11/ssd-2-768x457.png 768w, https://www.osradar.com/wp-content/uploads/2018/11/ssd-2-696x414.png 696w, https://www.osradar.com/wp-content/uploads/2018/11/ssd-2-706x420.png 706w" sizes="(max-width: 993px) 100vw, 993px" /></p>
<p>&nbsp;</p>
<p>Change the value to “Disabled”.</p>
<p><img loading="lazy" class="size-full wp-image-7004 aligncenter" src="https://www.osradar.com/wp-content/uploads/2018/11/ssd-3.png" alt="" width="993" height="591" srcset="https://www.osradar.com/wp-content/uploads/2018/11/ssd-3.png 993w, https://www.osradar.com/wp-content/uploads/2018/11/ssd-3-300x179.png 300w, https://www.osradar.com/wp-content/uploads/2018/11/ssd-3-768x457.png 768w, https://www.osradar.com/wp-content/uploads/2018/11/ssd-3-696x414.png 696w, https://www.osradar.com/wp-content/uploads/2018/11/ssd-3-706x420.png 706w" sizes="(max-width: 993px) 100vw, 993px" /></p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/bypass-hardware-disk-encryption-on-ssd-drives/">Bypass Hardware Disk Encryption on SSD Drives</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/bypass-hardware-disk-encryption-on-ssd-drives/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
