BitLocker is Windows default solution for encrypting disk volumes. A large number of organizations protect startup disks with BitLocker encryption. While adding the necessary layer of security, BitLocker also has the potential of locking administrative access to the encrypted volumes if the original Windows logon password is lost. We are offering a straightforward solution for reinstating access to BitLocker-protected Windows systems with the help of a bootable USB drive.
This isn’t the first article we publish about BitLocker. If you are not familiar with BitLocker encryption, you may find the Introduction to BitLocker: Protecting Your System Disk handy. That article describes the basics of BitLocker as viewed by the computer user. The follow-up article Unlocking BitLocker: Can You Break That Password? reveals much of the detailed under-the-hood operation of BitLocker; we recommend reading that article even if you know about BitLocker.
BitLocker volumes may be protected with one or several protectors of various types that can be used together (for tougher security) or in parallel (for easier recovery). Multiple combinations of such protectors are available. By default, Windows requires the minimum of two protectors when the user creates an encrypted volume. The volumes are commonly using TPM (the first protector), while the backup Recovery Key (a 48-character numeric password) is created and stored in the AD, the user’s Microsoft Account, or on the hard disk or removable USB drive.
What’s essentially wrong with this approach is that Microsoft offers no straightforward path to reinstate access to the user’s Windows account located on a BitLocker-encrypted system volume even if the backup protector (e.g. the recovery key) is available. Granted, one can still boot from a Windows recovery disk and mount the encrypted volume by supplying the recovery key. However, subsequent steps require either reinstalling Windows or backing up the data off the encrypted volume.
We are offering an easier way. Starting with version 7.05, Elcomsoft System Recovery can be used to unlock BitLocker volumes when you boot from the ESR USB drive. By booting from a USB drive, you can now do the following:
Not all protectors are created equal. When it comes to recovery access to a locked-out computer, things suddenly become more complicated than you might have imagined after reading the Unlocking BitLocker: Can You Break That Password? article.
BitLocker offers a range of protection options, mixing the TPM, all-digit PIN codes, recovery keys, passwords (user passphrases) and USB keys. While multiple protectors are commonly used for access recovery purposes, the most security conscious may specify the use of several protectors, all of which must be used together to unlock the encrypted volumes. Let’s see how the choice of BitLocker protectors affect the possibility to successfully unlock the volume.
The following table summarizes the experience.
In order to use Elcomsoft System Recovery, you will first need to create a bootable media (e.g. USB flash drive) with ESR 7.05 or newer. To create a bootable flash drive, just launch the tool on your computer (not the suspect’s computer) and follow the wizard.
Boot the target computer from the USB drive you have created. Once the computer finishes booting, Elcomsoft System Recovery will be launched. The tool will automatically scan the available hard drives for encrypted volumes. If ESR detects at least one BitLocker volume, the tool will prompt to unlock the drive:
Select “Yes” Next to continue. In the next window, ESR will display the drive letter and the type of protector. Note: if the tool detects that a BitLocker drive has least one unsupported protector (see previous chapter), the unsupported protectors will not appear in the list of disk protectors by default. To display all protectors including the unsupported types clear the “Show supported disk protectors only” check box.
Once the check box is cleared, you will see the unsupported types of disk protectors. In the example below, the startup drive was protected with TPM+PIN with the Recovery Key as a backup protector.
To unlock the drive, enter the Recovery Key (the 48 digits) in the “Numerical password” field, then click Unprotect. If the Recovery Key matches the encrypted partition, the volume will be successfully unlocked.
In some situations, you will encounter BitLocker volumes protected with several disk protectors of the supported type. In the example below, the volume was protected with a password, with the Recovery Key created as an additional (backup) protector. This is the default for non-boot volumes such as additional drives and partitions as well as external devices protected with BitLocker To Go. If this is the case, specify the type of protector you have access to. For example, if you know the password to the BitLocker volume, select “Password” as the “Unprotect type” and type in the corresponding passphrase to unlock the volume.
Every tool we make in a deeply discounted value pack. The complete suite of ElcomSoft password recovery tools allows corporate and government customers to extract data from mobile devices, unlock documents, decrypt archives, break into encrypted containers, view and analyze evidence. The password recovery suite features the latest and most advanced cryptanalysis algorithms developed by ElcomSoft Research department, while the mobile forensic tools enable access to critical evidence stored in physical devices, local backups and cloud services.
Elcomsoft Premium Forensic Bundle official web page & downloads »
Reset passwords to local Windows accounts and Microsoft Account and perform a wide range of administrative tasks. Assign administrative privileges to any user account, reset expired passwords or export password hashes for offline recovery, and create forensic disk images. Elcomsoft System Recovery is ready to boot thanks to the licensed Windows PE environment, allowing administrators to access locked computers.