Skip to content

Latest commit

 

History

History
41 lines (25 loc) · 1.56 KB

README.md

File metadata and controls

41 lines (25 loc) · 1.56 KB

WD-Decryption

The Western Digital Decryption tools for LINUX

The Files :

  • Decryption Script : The code creates a .BIN file that consists of a 40-byte decryption password.
  • Drive : A script designed to automate the process of drive encryption.


Configuration :


  1. dmesg | grep -i scsi
    Detect sdd the WD Adapter Drive

  2. ./wd-decrypt.py PASSWORD >password.bin
    Initialize your password into the script and Generate the Password file

  3. Install 'sg3_utils'
    This is the SG_UTILS package you need to install depending on the Linux Distro you use.

  4. sudo sg_raw -s 40 -i password.bin /dev/sdd c1 e1 00 00 00 00 00 00 28 00



The adapter.sh :


  1. python ./home/username/Desktop/cookpw.py SIFO123 >password.bin:
    This command runs a Python script called "wd-decrypt.py" located at "/home/username/Desktop" directory. It takes an argument "PASSWORD" and redirects the output to a file named "password.bin".

  2. sudo sg_raw -s 40 -i password.bin /dev/SDD c1 e1 00 00 00 00 00 00 28 00:
    This command is executed with superuser privileges ("sudo") and performs a low-level SCSI operation using the "sg_raw" command. It sends a SCSI command sequence to a device located at "/dev/SDD" (which could be a storage device like a hard drive).

    The specific command sequence being sent is represented by the hexadecimal values "c1 e1 00 00 00 00 00 00 28 00".