SecretZone
SecretZone copied to clipboard
Reversing Samsung SecretZone. Decrypt MSR files without any password! All thanks to Francesco Picasso. Only commercial (paid) support is available.
Samsung/Seagate (Un)SecretZone
Note: BACKUP YOUR .MSR FILES BEFORE USING THESE SCRIPTS AGAINST THEM.
Use patch-msr-files.py
to patch your password protected .msr files. After
patching, they will open with password openwall
. This scripts works for all
encryption algorithms supported by SecretZone, namely AES-128, AES-256, and
BLOWFISH-448.
Use decrypt-msr-files.py
to decrypt your password protected .msr files
directly, without requiring any password. This script only works for .msr files
which use AES-128 encryption.
Note: Use QEMU to emulate a SecretZone compatible USB external drive.
Usage
-
Python 2.7.x is required. PyCrypto and
python-magic
libraries are required (pip install --user pycryptodome python-magic
). -
Patch the original password protected file.
$ python patch-msr-files.py blowfish-12345.msr hello-openwall.msr
-
The patched output file (
hello-openwall.msr
) will now open with passwordopenwall
.
Notes
If you don't have the initial password for entering the SecretZone GUI,
overwrite your ui.dat
file with the one included in this repository.
Next login with either of the following credentials,
-
admin -> openwall
-
user -> 12345
This hack hasn't been tested much.
Credits
-
Francesco Picasso (https://github.com/dfirfpi, @dfirfpi) - AES-128 direct decryption support
-
Dhiru Kholia - Password patching method. Support for all supported algorithms.