Jump to content
Hak5 Forums
F1FORCE

Symantec endpoint encryption bypass ?

Recommended Posts

I need to pentest a notebook with symantec endpoint encryption enabled. The notebook normally connects to the domain controller and has win7 installed. Is it possible to bypass this kind of security in case of theft? Where do i start?

Any help would be appreciated

Share this post


Link to post
Share on other sites

Define what you mean by pentest it. 

Share this post


Link to post
Share on other sites

My boss asked me to test the companies new notebooks wit full disk encryption activated if it is possible in case of theft to retreive local data from the disk

Share this post


Link to post
Share on other sites

That's not a pentest.

First, define your risks, for example, stolen when turned on, turned off, standby, sleep. Then take each of those scenarios and see what state the drive is in and see if you can access it locally or remotely.

If it is on and there is VNC with no password then FDE does nothing, if it is off and the password for the encryption I'd strong then you are likely to be OK. You need to think of all the different things between these two.

  • Like 1

Share this post


Link to post
Share on other sites

The initial scenario is a notebook that is completely off. What i tried is to setup a fake domain controller and try to gain access as a cashed domain user but that didn't work. So i am running out of options. Maybe thats also a good thing for my boss😁

Share this post


Link to post
Share on other sites

Does the machine boot from fully off without requiring a password? If so, look for open ports, see what services it is running that are exposed to see if any of those can be exploited.

See what the box calls out to when booted, do any of those include credentials? Can any of those be intercepted? Maybe an app checks for updates that you can intercept and reply with a custom one.

I've not kept up on them, but do the FireWire attacks still work? There was a DMA issue where you could read memory. There was a second interface type that also allowed it, can't remember which it was.

Share this post


Link to post
Share on other sites

It fully boots till the windows logon screen, so i will check for any open ports/services.

Also the firewireport is worth testing

 

Thanks for your help.👍

Share this post


Link to post
Share on other sites

Check for weak local user passwords and weak domain ones that are cached.

Definitely look at the man in the middle for app updates, it can be an easy way to get code running on the box as admin.

Share this post


Link to post
Share on other sites

Can't execute a DMA/firewire  attack because the firewire port is not available on the notebook.

I set up a fake company Domain Controller but no results.

I scanned for open ports, but nmap finds nothing.  Also monitored the network but there was nothing interesting happening.

Seems to me a pretty secure notebook ;-)

Share this post


Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

  • Recently Browsing   0 members

    No registered users viewing this page.

×