Hi Michael, hi list,
Please take a look at
http://jessekornblum.livejournal.com/
253772.html. You are correct that when the user forces password
caching the password is in fact cached. On the other hand, there are
so many false positives that it's difficult to find only TC passphrases.
On Sep 14, 2009, at 10:47 AM, Michael Felber , Steufa Chemnitz, IT-
Forensik wrote:
Hello Jesse, hello list,
today I have given a try to the cryptoscan-plugin. The dump comes
from an XP with SP3. That should not be problematic because the
structure the plugin looks for is os-independent, isn’t it?
In the case I forced Truecrypt (v6.2a) to cache the passphrases in
memory I saw it as plain text:
<image003.jpg>
XWF was not able to allocate that offset (phys. 0x18218c84) to a
single process.
But I was not able to find the described structure neither with the
plugin nor manually. The dump is from a test case I use for forensic
classes. So I could provide it for further analysis.
It additionally includes cached domain credentials, waiting for
extraction….
Cu
Michael
_______________________________________________
Vol-dev mailing list
Vol-dev(a)volatilityfoundation.org
http://lists.volatilityfoundation.org/mailman/listinfo/vol-dev
--
Jesse
research(a)jessekornblum.com