Solved

XP Encryption Key Recovery?

Posted on 2004-08-26
3
342 Views
Last Modified: 2011-10-03
I have a client's hard drive that is going sour.  It will not boot to Windows XP anymore, but I am able to get some files off it via floppy bootup.  Unfortunately, there are encrypted files on this drive and the keys were not backed up.  Since I can not get Windows to load and do the 'normal' key backup in IE - is there any other way I can rescue these keys?  Anyone know where they are stored?
0
Comment
Question by:siteup
  • 2
3 Comments
 
LVL 2

Accepted Solution

by:
durkinr earned 500 total points
ID: 11905470
Add the drive as a slave in a WinXP Pro machine, and log on as the Local Administrator. The Admin account is usually the Recovery Agent for encrypted files.

Check out these instructions for how to recover the files:

http://www.tweakxp.com/tweak1590.aspx

Always remind people, that when they encrypt files on their hard drive, they really should backup their encryption certificate to a floppy or some other removeable media, and keep it in a safe place. It is very hard to recover a file if this is missing. Here is an important list of best practices for people to follow, including simple instructions for backing-up your certificates:

http://support.microsoft.com/?kbid=223316



0
 

Author Comment

by:siteup
ID: 11906510
Log onto Local Administrator for the machine I'm running Windows XP as the master on?  How is that going to allow me to ac cess the keys on the slave drive, which will not then have the OS loaded?
0
 
LVL 2

Expert Comment

by:durkinr
ID: 11906833
Its your only shot at recovering the files. Read the first article.
0

Featured Post

6 Surprising Benefits of Threat Intelligence

All sorts of threat intelligence is available on the web. Intelligence you can learn from, and use to anticipate and prepare for future attacks.

Join & Write a Comment

A few customers have recently asked my thoughts on Password Managers.  As Security is a big part of our industry I was initially very hesitant and sceptical about giving a program all of my secret passwords.  But as I was getting asked about them mo…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This video discusses moving either the default database or any database to a new volume.
You have products, that come in variants and want to set different prices for them? Watch this micro tutorial that describes how to configure prices for Magento super attributes. Assigning simple products to configurable: We assigned simple products…

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now