Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Integration of SafeGuard Easy (legacy) #3969

Open
Mangaclub opened this issue Mar 12, 2024 · 1 comment
Open

Integration of SafeGuard Easy (legacy) #3969

Mangaclub opened this issue Mar 12, 2024 · 1 comment

Comments

@Mangaclub
Copy link

Mangaclub commented Mar 12, 2024

Safeguard Easy (legacy) are the old Safeguard Versions many many Laptops has been encrypted in the early 2000s as SafeGuard Easy became cheap to buy.
When i talk about Legacy i mean SafeGuard Easy versions before it was aquired by Sophos so Version 1-4 in this case.
Especially the Version 1.0 operating with DES 56bit and IDEA -128bit keys should be fairly easy to crack but still needs someone to Impliment it.

Safeguard Easy could be unlocked with a simple Password token at bootup.
Have a look here!
https://github.com/AliGuard/Ultimaco-SafeGuard---Reverse-Engineering-Project

@MrRaja23
Copy link

I have no clue either but i'd like to leave this here to maybe make it more understandable (prompt by phind):

Imagine you're a detective trying to unlock a vault that's been sealed for decades. The vault is the encrypted hard drive of a laptop, and the key is the password that was used to encrypt it. The vault was built by a company called SafeGuard Easy, which was acquired by Sophos. The versions you're interested in are the early ones, versions 1 to 4, which used encryption algorithms like DES 56-bit and IDEA 128-bit. These algorithms are considered relatively weak by today's standards, making them a target for hackers.

The GitHub project you've found, Ultimaco-SafeGuard---Reverse-Engineering-Project, is like a treasure map for unlocking these vaults. It's a research project aimed at understanding how SafeGuard encrypted hard drives, from version 1.0 to 4.x. The project is a collaborative effort to reverse engineer the encryption methods, providing a knowledge base for anyone interested in accessing their data again.

To unlock a SafeGuard Easy encrypted hard drive, you would typically need to bypass the password token that's required at bootup. The project provides insights into how to manipulate the system's memory to reset the password attempt counter, which is a crucial step in unlocking the drive. For versions 1.0 to 3.5, the counter increments with each failed attempt, starting at E4 and counting up. For version 4.11, the counter counts down from DB. By identifying the memory location of this counter and resetting it, you can potentially bypass the lockout mechanism.

The project also delves into how SafeGuard stores passwords and usernames in memory. It suggests that even in encrypted userspace, the passwords are not stored as plain text but rather as 32-bit hashes. This means that understanding the hashing algorithm and the memory layout is key to unlocking the drive.

To get started, you would need to set up a virtual machine with a SafeGuard Easy installation and a test system, such as Windows XP or 2000. This setup allows you to experiment with different approaches to unlocking the drive without risking the original data. The project provides example memory dumps and instructions on how to use them to understand the encryption process better.

This endeavor is a fascinating journey into the world of encryption and reverse engineering. It's like solving a complex puzzle where each piece of information you uncover brings you closer to the solution. Whether you're a seasoned coder or just starting out, this project offers a unique opportunity to apply your skills in a challenging and rewarding way.

Remember, while cracking encryption is a fascinating challenge, it's also important to consider the ethical implications. Always ensure you have permission to access the data you're working with and use your skills responsibly.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants