Windows and Linux Authentication Bypass with AIM

DFIRScience
28 Jul 202206:04

Summary

TLDRIn this video, the presenter introduces three impressive features of Arsenal Image Mounter 3.9. The first feature allows mounting Linux disk images as read-only or writeable logical volumes, with options to bypass Linux authentication, providing access to user data without needing a password. The second feature demonstrates mounting Windows disk images for direct data recovery. The third feature, enabling Virtual DD, offers raw disk access to all devices, useful for tools requiring raw data input. The video highlights the ease of accessing passwords and system data, showcasing Arsenal Image Mounter's capabilities for forensic analysis.

Takeaways

  • 🚀 Arsenal Image Mounter 3.9 introduces three new features that enhance its capabilities.
  • 🔒 The first feature allows mounting Linux disk images as read-only or read-write, with changes written to a temporary file.
  • 🔓 A Linux authentication bypass is included, enabling access to the user's data without needing the password.
  • 🖥️ Launch VM is a new feature requiring Hyper-V, allowing the examination of an image within a virtual machine environment.
  • 🔐 For Windows systems, the tool can bypass the Data Protection API, providing access to saved passwords and forms.
  • 📂 The tool can mount disk images and present them as logical volumes, allowing direct access to the suspect's data.
  • 🔄 Write operations to the mounted disk image can be redirected to a temporary differencing file, preserving the original data.
  • 🔄 The 'delete differencing file after unmount' option allows for temporary changes to be discarded upon unmounting.
  • 🔑 The Linux authentication bypass does not unlock the keyring, limiting access to user-permissioned data only.
  • 🔍 The tool provides raw disk access via virtual DD images, useful for tools that require raw data input.
  • 🛠️ Arsenal Image Mounter's features are particularly useful for forensic analysis, offering a range of options for different operating systems.

Q & A

  • What is Arsenal Image Mounter 3.9?

    -Arsenal Image Mounter 3.9 is a software that allows users to mount disk images and interact with them as if they were physical drives, with new features for enhanced functionality.

  • What are the three new features added in Arsenal Image Mounter 3.9?

    -The three new features are Linux authentication bypass, Windows authentication bypass, and the ability to enable virtual DD for raw disk access.

  • How can one mount a Linux disk image as a read-only disk device in Arsenal Image Mounter 3.9?

    -By selecting the disk image and choosing the 'disk device read only' option, it will show up as a logical volume in Windows, allowing read-only access.

  • What does 'delete differencing file after unmount' mean in the context of Arsenal Image Mounter 3.9?

    -This option means that any changes made to the mounted image are stored in a temporary file instead of the actual disk image, and this file is deleted once the image is unmounted.

  • Why might the Windows File System Driver Bypass feature not work for a Linux image?

    -The Windows File System Driver Bypass is designed for Windows images and would not be effective for Linux images due to differences in file system structures and access mechanisms.

  • What is the significance of launching a VM with Arsenal Image Mounter 3.9?

    -Launching a VM allows users to interact with the mounted image as if it were a live system, which requires Hyper-V to be installed on a Windows Pro version or equivalent setup.

  • How does the Linux authentication bypass feature work in Arsenal Image Mounter 3.9?

    -The Linux authentication bypass feature allows users to log in to the system without needing the user password, providing access to all files and data the user has permissions for.

  • What limitations does the Linux authentication bypass have regarding access to certain system components?

    -While it allows login and access to user-permissioned data, the Linux authentication bypass does not automatically unlock the key ring, which may restrict access to certain secured elements of the system.

  • How does the Windows authentication bypass differ from the Linux version in Arsenal Image Mounter 3.9?

    -The Windows authentication bypass not only allows login without a password but also provides access to data protected by the Data Protection API (DPAPI), including passwords saved in browsers and other applications.

  • What is the purpose of enabling virtual DD in Arsenal Image Mounter 3.9?

    -Enabling virtual DD provides a mount point for each logical and physical device as if they were .dd images, allowing raw disk access for tools that require it, without the need for imaging.

  • How can the virtual DD feature be utilized for forensic analysis?

    -The virtual DD feature allows forensic analysts to extract raw data from mounted images using command-line tools or other software that operates on raw disk images, facilitating a more direct and efficient analysis process.

Outlines

00:00

🔒 Linux and Windows Authentication Bypass with Arsenal Image Mounter 3.9

This paragraph introduces the new features in Arsenal Image Mounter 3.9, focusing on the ability to bypass authentication for both Linux and Windows systems. The speaker demonstrates mounting a Linux disk image as a read-only device and then as a temporary writable device, which allows for writing to a temporary file instead of the original data. The key feature highlighted is the bypassing of Linux user authentication, which enables access to user data without needing the user's password. The speaker also discusses the limitations of this feature, such as the inability to unlock the key ring. Additionally, the paragraph covers the process of launching a virtual machine (VM) using the mounted image and the new feature of bypassing Windows authentication, including bypassing the Data Protection API (DPAPI) for certain accounts.

05:02

🛠️ Raw Disk Access and Virtual DD with Arsenal Image Mounter

The second paragraph delves into the advanced capabilities of Arsenal Image Mounter for accessing and analyzing disk images. The speaker explains how to enable virtual DD, which provides a mount point for a virtual DD image for every logical and physical device on the system. This feature is particularly useful for tools that require raw data access. The speaker illustrates this by navigating to the virtual DD drive and using the 'strings' command to extract data from a physical drive image, demonstrating the ease with which raw disk access can be achieved. The paragraph concludes by emphasizing the value of these features for forensic analysis, especially when dealing with compressed e01 images and the need for raw data extraction without imaging.

Mindmap

Keywords

💡Arsenal Image Mounter 3.9

Arsenal Image Mounter 3.9 is a software application that allows users to mount disk images as if they were physical drives. In the video's context, it is used to demonstrate the mounting of Linux and Windows disk images, showcasing the software's new features. The script mentions it as the main tool for the discussed operations, highlighting its importance in digital forensics and data recovery.

💡Linux disk image

A Linux disk image is a file that contains a complete copy of a Linux system's disk, which can be used for backup, recovery, or analysis purposes. The script describes mounting a Linux disk image using Arsenal Image Mounter 3.9, emphasizing the read-only and read-write options, and how it can be used to access and interact with the file system of the imaged Linux environment.

💡Logical volume

In the context of storage management, a logical volume is a portion of a disk that is allocated for specific use. The script mentions that when a disk image is mounted, it shows up as a logical volume in Windows, allowing users to interact with the mounted image as if it were a part of the physical disk.

💡Differencing file

A differencing file is a type of file used in virtualization and disk imaging to store changes made to a virtual disk. In the script, the option to create a temporary differencing file after unmounting is discussed, which allows for changes to be written to a temporary file instead of the original disk image, preserving the integrity of the original data.

💡Hyper-V

Hyper-V is a virtualization feature of Windows that allows users to run multiple operating systems on a single physical computer. The script mentions that launching a virtual machine (VM) with the mounted image requires Hyper-V to be installed, which is a key component for demonstrating the new features of Arsenal Image Mounter 3.9.

💡Bypass Linux authentication

Bypassing Linux authentication refers to the ability to access a Linux system without the need for a user password. The script explains that Arsenal Image Mounter 3.9 has added a feature that allows users to bypass the user password on a Linux image, providing access to the user's data and settings.

💡Key ring

A key ring in the context of Linux is a collection of cryptographic keys used for various purposes, such as unlocking encrypted files. The script points out that while Linux authentication can be bypassed, the key ring is not automatically unlocked, which means certain encrypted elements remain protected.

💡Data Protection API (DPAPI)

The Data Protection API (DPAPI) is a Windows feature that provides data encryption and decryption services. The script discusses bypassing DPAPI as a feature in Arsenal Image Mounter 3.9 for Windows images, allowing access to encrypted data without the need for the original encryption keys.

💡Virtual DD

Virtual DD refers to a virtual representation of a physical disk image (DD), which is a raw disk image format. The script highlights the feature in Arsenal Image Mounter 3.9 that enables virtual DD access, providing a way to work with raw disk data without the need for physical disk access or additional imaging software.

💡Strings

In the context of the script, 'strings' is a command-line utility used to extract human-readable text from a binary file. The script demonstrates using the 'strings' command on a physical drive's DD image to extract and analyze data, showcasing a practical application of the virtual DD feature.

Highlights

Introduction of Arsenal Image Mounter 3.9 with three new features.

Ability to mount a Linux disk image as a read-only disk device, showing up as a logical volume in Windows.

Option to write to a disk image temporarily with changes saved to a differencing file.

Bypassing Linux authentication to access user data without the need for a password.

Launch VM feature requiring Hyper-V installed on Windows Pro or a workaround for Home versions.

Access to user's browser and saved passwords post authentication bypass.

Limitation of Linux authentication bypass not unlocking the key ring.

Mounting a Windows disk image with options for read-only or temporary write access.

Direct access to suspect's data from the system using recovery tools.

Bypassing Windows authentication including Data Protection API (DPAPI).

Detection of accounts where DPAPI can be bypassed.

Access to user's desktop and browser history post Windows authentication bypass.

Recovery of saved website credentials including usernames and passwords.

Introduction of Virtual DD feature providing raw disk access to every device on the system.

Use of Virtual DD for tools that require raw data access without imaging.

Command line tools compatibility with raw data extraction from Virtual DD.

Arsenal Image Mounter's innovative features for digital forensics and data recovery.

Transcripts

play00:00

welcome back everyone today I want to

play00:01

talk about Arsenal image mounter 3.9 and

play00:04

they've added three features that are

play00:05

just amazing so I thought I should talk

play00:08

about them so the first one we're going

play00:09

to look at a Linux disk image I'm using

play00:11

the magnet Lenovo disk image we can

play00:14

mount it as disk device read only and if

play00:16

we do that then it will show up as a

play00:18

logical volume in Windows we can do a

play00:20

disk device right temporary it'll also

play00:22

show up as a logical volume but we can

play00:24

actually write to it and we're going to

play00:26

select that one and then select delete

play00:27

differencing file after unmount so

play00:30

basically any rights are sent to a

play00:32

temporary file instead of to the actual

play00:35

suspect data we could also do Windows

play00:37

File system driver bypass read only

play00:39

problem with this is we're looking at a

play00:41

Linux image so this isn't a Windows

play00:44

image so this wouldn't work for us then

play00:46

click ok so now we have our Linux image

play00:48

mounted on e Drive what I can do next is

play00:50

launch VM and launch VM requires hyper-v

play00:53

installed on Windows you do have to have

play00:55

a Windows pro version unless you do

play00:57

something kind of hacky and then you can

play00:59

get it for Windows was home you want to

play01:00

try hyper B out I'll give some

play01:02

instructions below okay so we can do

play01:03

launch VM and really the new thing that

play01:05

I want to show you is bypass Linux

play01:07

authentication has been added so if we

play01:10

click that click ok now the virtual

play01:13

machine is going to start up this image

play01:15

does have a user password set so here we

play01:18

see the user login account if I just

play01:20

click on it and I'm in so they've

play01:22

already bypassed the user password now I

play01:24

can go to things like the user's browser

play01:26

go to passwords and then we can see

play01:29

different accounts that have been saved

play01:30

and we can see what their actual

play01:32

password is what this doesn't do is

play01:35

unlock the key ring so it allows you to

play01:38

log in and you can get access to

play01:40

anything that the user has permissions

play01:42

for but things like the key ring are not

play01:44

automatically unlocked or at least it

play01:46

doesn't seem like they are so that's

play01:47

Linux authentication bypass now I can go

play01:49

in and interact with the system just

play01:51

like I was the user next we can do

play01:53

basically the same thing for Windows go

play01:55

to mount disk image select the image

play01:58

that we want I'm going to choose Lone

play01:59

Wolf because I think everyone's familiar

play02:01

with that one same idea disk device read

play02:03

only disk device right temporary I'm

play02:05

going to go ahead and select write

play02:06

temporary delete differencing file after

play02:08

unmapped click OK it's now mounting and

play02:11

you can see we have local disk e g and H

play02:14

in the Explorer menu if I click on E

play02:17

then we get something that looks a lot

play02:19

like the system drive for a Windows

play02:21

system and it is actually this drive was

play02:24

mounted under e now I can search the

play02:26

suspect's data directly from my system

play02:28

using whatever tool I choose to recovery

play02:32

is exactly what we expect in h we don't

play02:34

have access to there's a lot of

play02:35

different options now with Windows

play02:37

systems but we're going to go ahead and

play02:39

launch VM so this looks a little bit

play02:41

different than the Linux system we have

play02:43

a few more options and they're all

play02:44

specific to Windows we can do things

play02:46

like inject aim virtual machine tools

play02:48

and adjust boot drivers we want to do

play02:50

that boot with last Windows shutdown

play02:51

time and then bypass Windows

play02:53

authentication that's what we're

play02:54

interested in here and we specifically

play02:56

want to try to bypass data protection

play02:58

API or DP eapi and any accounts where

play03:02

data protection API can be bypassed

play03:04

should be detected here and we do have

play03:05

one account that's detected click that

play03:07

click ok so now we have our jcloudy

play03:10

account and there's the password field

play03:12

if I just hit enter I'll be able to go

play03:14

in because we've bypassed authentication

play03:16

now I can see the user's desktop as they

play03:18

would have used it I can also open up

play03:20

their browser and it says it wasn't shut

play03:22

down correctly do you want to restore

play03:23

Pages we could potentially restore that

play03:25

I'm not going to and then we can go to

play03:27

settings Advanced passwords and forms

play03:31

manage passwords we can see the websites

play03:33

that were saved the username for that

play03:35

website and then the password that they

play03:37

were using and unlock that password

play03:38

unlike Linux Windows uses data

play03:42

protection API and it doesn't use that

play03:44

key ring so we don't have to unlock a

play03:46

key ring as soon as we bypass data

play03:48

protection API we can get access to this

play03:50

kind of information and the final thing

play03:52

I want to show I'm going to mount disk

play03:53

image we're going to choose a Windows

play03:55

image here so lone wolf again disk

play03:57

device write temporary delete

play03:59

differencing file after unmount so now

play04:01

it's mounted we have our Mount points

play04:03

here I'm going to go to Advanced and

play04:07

enable virtual DD and this is one of my

play04:10

favorite features because now we have a

play04:13

mount point for virtual DD that is f so

play04:16

if I click on F virtual DD then you can

play04:19

see that we have a what looks like a DD

play04:22

image for every single one of our

play04:24

logical devices and our physical devices

play04:27

let's go look at this this was physical

play04:29

device physical Drive 2 okay so we have

play04:32

a physical Drive 2.dd Arsenal image

play04:34

mounter is providing raw disk access to

play04:39

every device on your system so if your

play04:42

tools only take raw data then you can

play04:45

use enable virtual DD you'll get access

play04:47

to all the devices on your system via

play04:50

DOT DD kind of virtual image and then

play04:52

you can process it using your tools so

play04:54

if you've watched this channel for a

play04:55

while you know that I love command line

play04:57

and a lot of tools from command line

play04:58

only like more dealing with raw data

play05:02

okay so we can go ahead and CD into F

play05:05

drive and this is our virtual DD drive

play05:07

we have our physical Drive 2 here we

play05:10

have all the physical drives plus our

play05:11

logical drives so I'm going to focus on

play05:13

physical Drive 2 so I'm going to use

play05:15

strings physical Drive DD and then more

play05:19

and then we can see here invalid

play05:21

partition table error loading operating

play05:22

system that looks like the beginning of

play05:24

a disk and then I can just do a quick

play05:25

string extraction from that raw data

play05:27

device providing that DD functionality

play05:29

is very useful because we started with

play05:30

an e01 which is usually compressed and

play05:33

from that we can very easily without

play05:35

Imaging get access to a raw device in

play05:38

case your tools don't support easy Row

play05:40

one so I thought those three features

play05:41

were worth sharing Linux authentication

play05:43

bypass Windows authentication bypass and

play05:46

virtual DD so go check out Arsenal image

play05:49

mounter some really cool stuff happening

play05:51

there

Rate This

5.0 / 5 (0 votes)

関連タグ
Arsenal Image MounterDisk AnalysisLinux AuthenticationWindows BypassData RecoveryVirtual MachineHyper-VFile SystemSecurity ToolsForensics
英語で要約が必要ですか?