Scan for encryption keys
|Top Previous Next|
If you previously exported the recovery agent EFS private key (and have the *.pfx file), just press Add Certificate button, browse for the file, supply its password, and AEFSDR can use it for file recovery/decryption now. In that case, you will not need to scan your disk(s) for encryption keys, as described below. Otherwise, continue reading.
Always start using the program with scanning for encryption keys. At EFS related files tab, press Scan for keys button (or select Scan | Scan for keys menu item; or press Scan for keys button on toolbar); the program will show the list of (local) logical disks, along with their sizes and file systems:
Here, you have to select the boot disk, i.e. the one operating system is (was) loading from, and so where system Registry and encryption keys are located. In some cases, however, encryption keys are located on other disk, so if you're not sure, you can check multiple disks for scanning.
By selecting the Scan by sectors option, you force the program to scan the disk(s) at the lowers (sector) level, so it may find the keys that have been deleted, or after re-formatting the disk. Note that such scan is much slower than the 'normal' one, so we recommend to perform the first scan with this option disabled, and only if the keys (needed for decryption) is not found, re-scan the disks by sectors.
Note the Hide scanning disks option at the bottom – if it is enabled (default) and you already scanned some disk(s) during current program session, these disk(s) will not be shown in that window as far as all keys from there have been already found. If you still wish to see (and select from) all the disks available in the system, uncheck this option.
On pressing the Start Scan button, the program will scan the given disk(s) trying to find all files needed for further decryption of your data:
These files are:
Usually, there are a few encryption keys (the actual value may vary depending on the number of users in the system), and a few copies of SYSTEM and SAM Registry (the "active" one, and two or more backup copies) – but at least one of each. For more information on Registry, look at Description of the Microsoft Windows Registry article at Microsoft web site.
If any of those components are missing, it means that either you have selected the wrong disk (in that case, simply scan the correct one – or just all of them; the required data, if found, will be appended to the list already created), or they are not available at all (if, for example, they were deleted manually, or the disk has physical errors).
Encryption keys in that list are always in red or green color. Green one means that the key has been decrypted successfully; or if the key is in red – decryption failed.
The last column on this screen, Comments, shows additional information about encryption keys (what particular version of Windows the have been created in), and SYSKEY mode (see below).
If some keys were not decrypted (i.e. they're red), don't panic. Probably, these keys are not needed at all, and you can go directly to the second step – Scan for encrypted files or Browse for encrypted files. And only if AEFSDR will not be able to decrypt the files you need, return to EFS related files and try to fix the problem as described below.
Password encryption (Windows XP/2003/Vista/2008/7) or SYSKEY protection (Windows 2000)
First, if the files were encrypted on Windows XP or later version, you have to supply the (logon) password of user who encrypted the file(s), or the password of Recovery Agent. Press Add user password button, and enter the user name and password (as text or in hex/UNICODE). User name, actually, does not matter (only password does), so enter it just for the reference. There is no need to add the empty password.
Please note that you can add more than one name/password, and after adding each one, AEFSDR will try to decrypt all keys listed on that tab – on success, the color will change from red to green. Alternatively, you can use Add password from dictionary option, and load the password lists from the text file. That file should contain only the passwords, one per line, without user names (which do not actually matter). It is not recommended to use large wordlists (more than a few hundred entries), especially on Windows XP and later versions, and/or if there are a lot of encryption keys, as far as it takes a lot of time.
In Windows 2000, the password is usually not needed, until advanced SYSKEY protection is being used (for more information, see How to use the SysKey utility to secure the Windows Security Accounts Manager database). There are three possible SYSKEY options:
AEFSDR should work just fine if last (default) option has been used in a system you're working with, i.e. the keys should be decrypted automatically. But if Startup Key is (was) stored on floppy disk, or Password Startup was selected, the program simply will not be able to decrypt some keys. In that case, you should supply the password (like in Windows XP/2003, see above). Alternatively, if you have the floppy disk with startup key, or know the startup password, you can add them to the program by pressing the Add SYSKEY button. You can add multiple passwords or keys using that feature (but one at a time). Please note, however, that after adding SYSKEY you will have to re-scan for encryption keys.
Password has been changed after encryption
After you change your domain password, you may receive an error message when you try to gain access to protected data. This problem occurs because the protected data is encrypted using a hash that is based on your password. When you change your password on the domain, the data is not re-encrypted with the new password until you first access the data. If you try to access the data for the first time while you are disconnected from the domain, the domain controller cannot be contacted. Therefore, the data cannot be accessed and re-encrypted with the new password.
By design, AEFSDR should be still able to decrypt encryption keys (and so protected data), but if not, use the same trick as for SYSKEY Protection problem, i.e. by adding user password(s). If you don't know them, try the solution described in the following Microsoft Knowledge Base article:
Computer is a part of domain
The recovery policy provides for a person to be designated as the recovery agent. A default local recovery policy is automatically created when an administrator account logs on to the computer for the first time. When this process occurs, that administrator becomes the default recovery agent. In some situations, the first administrator to log on to Windows 2000 is not the local administrator account. An appropriate Microsoft Knowledge Base article is:
If local administrator is the default recovery agent for your data, AEFSDR will work properly. If not (as described in the article mentioned above), you will have to add user passwords to decrypt the keys (see above).
Backup/restore decrypted keys
When/if encryption keys (and other EFS-related data) have been found and decrypted by the program, it is recommended to save them for the future use – to avoid scanning the disk again, or just for the case if some data will be tampered. Press Backup data button in AEFSDR, and select the file name to save what you have recovered. When you will use AEFSDR the next time, you'll be able to get all the keys by pressing Restore data button, instead of scanning the disk again, adding user passwords etc.
Get more information about Advanced EFS Data Recovery
Get full version of Advanced EFS Data Recovery
(c) 2014 ElcomSoft Co.Ltd.