crowbar and PGP Virtual Disk

I actually took a vacation to the beach a couple weeks ago.   Relaxing as I watched the ocean waves I decided to throw together a crowbar version to attack pgp virtual disk files.  So where is it?

It did not take me long to adapt my script attack to a crowbar version.  I did run into a big problem though and this is why I have not released crowbarPGP.  After running for about 10-15 minutes it will stop trying to mount the pgp virtual disc file. And in fact restarting the program won’t resume the attack. You cannot get it to start over till you reboot your mac.  My conclusion is that there must be some sort of memory leak in the pgpdisk command.  Hit that with a thousand attempts in rapid succession and it goes to hell.

I just don’t want to release a program version when I know its not going to be able to run to completion regardless of the dictionary file size.  I’ll catch the heat for what I feel is clearly a flaw in pgpdisk.

*Update June 5, 2009*  PGP contacted me, I sent them the materials and a video demo.  They actually said something about a thread not being released and it will be fixed.  Soon as that works I’ll release crowbarPGP.

Share

3 Replies to “crowbar and PGP Virtual Disk”

  1. Hello!!
    Would it be possible to also allow the command to run on an encrypted volume??

    The mounting command is…

    pgpwde –decrypt –passphrase <passphrase> –disk <n>

    That would be awesome!
    Thanks :)

  2. To follow up, Rich took my previous pgp virtual disc shell script and replaced the key command line with the line he provided above. He had also fed the script a dictionary file made of the permutations of what he felt his passphrase was. It worked like a champ. Since then I have also compiled a local copy of crowbar using that command and it works great. I will release a public version once I can come up with a way to select in gui the connected disks for attack. That is a LOT harder than you think it would be. Just ask any mac developer about I/O kit and watch them run away screaming.

  3. To follow up, Rich took my previous pgp virtual disc shell script and replaced the key command line with the line he provided above. He had also fed the script a dictionary file made of the permutations of what he felt his passphrase was. It worked like a champ. Since then I have also compiled a local copy of crowbar using that command and it works great. I will release a public version once I can come up with a way to select in gui the connected disks for attack. That is a LOT harder than you think it would be. Just ask any mac developer about I/O kit and watch them run away screaming.

Comments are closed.