Jump to content

Symantec endpoint encryption bypass ?


Recommended Posts

I need to pentest a notebook with symantec endpoint encryption enabled. The notebook normally connects to the domain controller and has win7 installed. Is it possible to bypass this kind of security in case of theft? Where do i start?

Any help would be appreciated

Link to comment
Share on other sites

That's not a pentest.

First, define your risks, for example, stolen when turned on, turned off, standby, sleep. Then take each of those scenarios and see what state the drive is in and see if you can access it locally or remotely.

If it is on and there is VNC with no password then FDE does nothing, if it is off and the password for the encryption I'd strong then you are likely to be OK. You need to think of all the different things between these two.

Link to comment
Share on other sites

The initial scenario is a notebook that is completely off. What i tried is to setup a fake domain controller and try to gain access as a cashed domain user but that didn't work. So i am running out of options. Maybe thats also a good thing for my boss?

Link to comment
Share on other sites

Does the machine boot from fully off without requiring a password? If so, look for open ports, see what services it is running that are exposed to see if any of those can be exploited.

See what the box calls out to when booted, do any of those include credentials? Can any of those be intercepted? Maybe an app checks for updates that you can intercept and reply with a custom one.

I've not kept up on them, but do the FireWire attacks still work? There was a DMA issue where you could read memory. There was a second interface type that also allowed it, can't remember which it was.

Link to comment
Share on other sites

Can't execute a DMA/firewire  attack because the firewire port is not available on the notebook.

I set up a fake company Domain Controller but no results.

I scanned for open ports, but nmap finds nothing.  Also monitored the network but there was nothing interesting happening.

Seems to me a pretty secure notebook ;-)

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Recently Browsing   0 members

    • No registered users viewing this page.
  • Create New...