Mailbag – Brute Forcing a Missing BitLocker Recovery Key – NoGeekLeftBehind.com (2024)

So, a blog reader tracked me down on the interwebs in a panic. He had a forum question and one of my blog posts seemed to be headed in the general direction of his desired answer.

Instead of printing or saving the numeric BitLocker Recovery Key to a TXT file, the user wrote it down on a piece of paper.

Unfortunately, and as fate would have it, one of the number groups was mistakenly written only 5-digits long. When he later tried to unlock the USB drive that was secured with BitLocker, Windows popped up an error because the key was wrong.

He hoped there was some easy way to show the Recovery Key via PowerShell (which there is, but only if the drive was unlocked). And he couldn’t unlock the USB drive without the Recovery Key. It’s the classic ‘chicken or the egg’ scenario.

Since the drive was locked, PowerShell couldn’t display the BitLocker recovery key, and there were very few options left.

If you’re not super-familiar with BitLocker Recovery Keys, they follow this format:

  • There are 8 groups of numbers
  • Each group has exactly 6 digits (no more, no less)
  • The digits can range from 0 through 9
  • There are no letters
  • There are no special characters

So, a fake BitLocker recovery key would be arranged like this:
111111-222222-333333-444444-555555-666666-777777-888888

8 groups x 6 digits each = 48 digits total (not including the dashes).

In the case of our person needing help, he was missing the 5th group of digits. So, if everything he knew of the key was changed into letters, we could present it like this:

“AAAAAA-BBBBBB-CCCCCC-DDDDDD-######-FFFFFF-GGGGGG-HHHHHH”

In other words, he was missing the “E’s” in the example above.

There are only 1 million combinations between 000000 – 999999

PowerShell would need to try and loop through each possible combination of ###### like this:

AAAAAA-BBBBBB-CCCCCC-DDDDDD-000000-FFFFFF-GGGGGG-HHHHHH
AAAAAA-BBBBBB-CCCCCC-DDDDDD-000001-FFFFFF-GGGGGG-HHHHHH
AAAAAA-BBBBBB-CCCCCC-DDDDDD-000002-FFFFFF-GGGGGG-HHHHHH

…all the way down to…

AAAAAA-BBBBBB-CCCCCC-DDDDDD-999997-FFFFFF-GGGGGG-HHHHHH
AAAAAA-BBBBBB-CCCCCC-DDDDDD-999998-FFFFFF-GGGGGG-HHHHHH
AAAAAA-BBBBBB-CCCCCC-DDDDDD-999999-FFFFFF-GGGGGG-HHHHHH

First, we need the key groups with the missing digit(s). Below is a BitLocker Recovery Key broken into the 8 groups:

  1. 630564
  2. 061798
  3. 390588
  4. 707146
  5. – – missing / incomplete – –
  6. 631521
  7. 598389
  8. 222321

Yes, this is a real BitLocker Key. And, no, this isn’t the key from the user in question. It’s from a brand new USB flash drive that I just encrypted.

In plain English, we need PowerShell to take Groups 1-4, insert the dashes, insert 000001, append Groups 6-8 with the dashes, then try to unlock the drive.

If that key fails, do it again, but use 000002 in the middle (and so on, and so on) until the drive unlocks.

It was a bit frustrating to figure out the right syntax, but I was finally able to write a PowerShell script to plow through the possible combinations. The script now works as expected, effectively brute-forcing the drive unlock.

  • There is no crypto involved.
  • This is exactly the same logic as opening a combination padlock
    (you just try all combinations until it unlocks).
  • At a speed of 7 guesses per second, it takes about 40 hours to go through all 1,000,000 possible combinations of ######.
  • The script could be modified to guess more of the Recovery Key, but each additional digit would increase the attack / break time by 10x:
    • 7 digits would require 400 hours.
    • 8 digits would require 4,000 hours.
    • 12 digits (######-######) would take 40 million hours.
    • 48 digits would be practically infinity.
  • The practical benefit is if you’re missing 1-6 digits (and know where those digits go in the Recovery Key).

Note: Obviously, this is not meant to penetrate BitLocker. It’s just an edge-case tool where you know that one group of 6 numbers is missing or incomplete. If you’re ever in that situation yourself, Microsoft is certainly not going to help you.

Below is a screen shot of the PowerShell code (with line numbers).

Here is the script actively trying to find the correct fifth group of digits:

And here’s what it looks like after finishing successfully:

Yes, it really is that boring.

So I guess it’s time to give you the PowerShell code so you can test this IN YOUR OWN LAB ENVIRONMENT ONLY!

  1. Open the PowerShell Integrated Scripting Environment (ISE)
    (Right-click the PowerShell icon, click Run ISE as Administrator,
    click Yes if prompted by User Account Control).
  2. Copy everything in the box labeled “Actual PowerShell Code” below.
  3. Paste that text into Power Shell ISE window (the white window on top, not the blue window on the bottom)
  4. Replace "630564-061798-390588-707146-" on Line #7 with your first known groups of 6 digits. Make sure to include the dashes.

    Note: If you’re missing the first group of 6 numbers (AAAAAA) change line #7 to
    $FirstGroup = ""

  5. Enter the remaining known groups of digits and dashes on Line #11.

    Note: If you’re missing the last group of 6 numbers (HHHHHH) change line #7 to
    $LastGroup = ""

  6. Make sure your drive letter for the USB drive is correct on Line #29 & Line #48
  7. Hit F5 to run
  8. Sit back and watch it go. The script will stop when the drive is unlocked.

Note: If you want to stop the script prematurely you can hit Ctrl-C or the red Stop button in ISE.

First – some caveats:

  • This script is for BitLocker To Go (or hard drives that are connected to an already running operating system). If your C: drive is the one that is locked, take it out and slave it off of another functioning PC.
  • You have to change the drive letter in the script to match your drive (see Step 6 above).
  • And you have to know at least 42 of the 48 digits of the BitLocker Recovery Key.

Happy experimenting!

# The PowerShell Script tries to determine the recovery key by brute-forcing an unlock
# of a BitLockered drive. This script only works if you’re missing one of the 6-digit
# groups of numbers in the recovery key.

# First group of Recovery Key characters, followed by a hyphen, in quotation marks
# Example: "630564-061798-390588-707146-"
$FirstGroup = "630564-061798-390588-707146-"

# Last group of characters, preceded, in quotation marks
# Example: "-631521-598389-222321"
$LastGroup = "-631521-598389-222321"

# Loop through the set of numbers
# Note: You can change the numbers from 1..100000 to a smaller range if you like

ForEach ($MiddleGroup in 0..999999)
{

# Adds Leading Zeros
$Leading = $MiddleGroup.ToString("000000")

# Concatenates the Recovery Key
$Key = "$FirstGroup$Leading$LastGroup"

# Try to unlock the drive
.\manage-bde.exe -unlock F: -recoverypassword $Key >$null

# Get the status of the drive
$Status = Get-BitlockerVolume -MountPoint "F:"

# Write the currently-guessed Recovery Key to Screen
Write-Host $Key

# Check disk space of drive, if capacity equals "0" that means drive is still locked
# If capacity is not equal to "0", that means the drive is now unlocked
If ($Status.CapacityGB -ne "0") {Break}
}
# Output when successful
Write-Host
Write-Host
Write-Host "Drive successfully unlocked with the following Recovery Key:"
Write-Host
Write-Host " 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 " -BackgroundColor "Yellow" -ForegroundColor "Black"
Write-Host $Key -Back "Yellow" -Fore "Black"
Write-Host
Write-Host "(You should write this down immediately!)"
Write-Host
Get-BitLockerVolume -MountPoint "F:"

If you have questions, you can usually find me on Twitter: @timbarrett

Rating: 8.5/10 (6 votes cast)

Mailbag – Brute Forcing a Missing BitLocker Recovery Key – NoGeekLeftBehind.com (2024)

FAQs

Can BitLocker pin be brute forced? ›

TPM with PIN: in addition to the protection that the TPM provides, BitLocker requires that the user enters a PIN. Data on the encrypted volume can't be accessed without entering the PIN. TPMs also have anti-hammering protection that is designed to prevent brute force attacks that attempt to determine the PIN.

What do I do if I can't find my BitLocker recovery key? ›

In your Microsoft account: Open a web browser on another device. Go to https://account.microsoft.com/devices/recoverykey to find your recovery key. Tip: You can sign into your Microsoft account on any device with internet access, such as a smartphone.

What happens if I don't have a BitLocker recovery key? ›

If you are unable to locate a required BitLocker recovery key and are unable to revert a configuration change that might have caused it to be required, you must reset your device using one of the Windows 10 recovery options. Resetting your device removes all your files.

What can trigger the BitLocker recovery key? ›

The following list provides examples of common events that cause a device to enter BitLocker recovery mode when starting Windows:
  1. Entering the wrong PIN too many times.
  2. Turning off the support for reading the USB device in the preboot environment from the BIOS or UEFI firmware if using USB-based keys instead of a TPM.
Jun 18, 2024

How do I unlock BitLocker without PIN? ›

The only way you can unlock Bitlocker without a password/PIN/SmartCard/USB is with TPM. You may need to enable/configure this in the BIOS. You also NEED to backup the Recovery Key for when TPM unlock inevitably falters. A compatible Trusted Platform Module (TPM) Security Device cannot be found on this computer.

How do I force BitLocker to unlock? ›

To unlock their drives, users must open “This PC” (or “My Computer”, depending on the version of Windows), right-click on the encrypted drive icons with the locked yellow padlock icon, click "Unlock Drive" and provide the Password.

Is there a BitLocker recovery key generator? ›

3. Is there a Bitlocker recovery key generator? No, there isn't a Bitlocker recovery key generator. A Bitlocker recovery key is a unique 48-digit numerical password that's generated when you turn on Bitlocker Drive Encryption for the first time.

What is the command to get the BitLocker recovery key? ›

Follow the steps:
  1. Open Command Prompt: Press the Windows key + X and select “Command Prompt (Admin)”.
  2. Input command: Input “manage-bde -protectors -get ” in the command, replacing “ ” with the actual letter of the encrypted BitLocker drive.
  3. Find Recovery Key: Notice the 48-digit recovery key displayed on your screen.

How do I disable BitLocker recovery? ›

  1. Type and search [Manage BitLocker] in the Windows search bar①, then click [Open]②.
  2. Click [Turn off BitLocker]③ on the drive that you want to decrypt. ...
  3. Confirm whether you want to decrypt your drive, then select [Turn off BitLocker]④ to start turning off BitLocker, and your drive will not be protected anymore.
Oct 24, 2023

Is it possible to recover data without BitLocker recovery key? ›

Use BitLocker Repair Tool: The BitLocker Repair Tool is a built-in feature in Windows that can help repair encrypted drives without the recovery key. Users can access the tool through the BitLocker Drive Encryption Control Panel and follow the instructions to repair the drive's encryption metadata.

Can I reset my laptop without BitLocker recovery key? ›

Of course, yes. When the Windows system is protected with BitLocker, the only way to access its content is to unlock the system drive. However, if you don't have the recovery key or password, you need to factory reset PC by fully formatting the system drive and reinstalling Windows 10.

How do I unlock BitLocker if I forgot my password? ›

Press Win + E keys to open the File Explorer, and then right-click the system drive or other BitLocker encrypted drive and select Change BitLocker PIN. Step 2. In the pop-up window, click on the Reset a forgotten PIN link. It will allow you to set up a new password without asking for the current PIN.

Why did BitLocker suddenly activate? ›

If a device doesn't initially qualify for device encryption, but then a change is made that causes the device to qualify (for example, by turning on_Secure Boot_), device encryption enables BitLocker automatically as soon as it detects it.

Can malware trigger BitLocker? ›

The malware then checks if the BitLocker Drive Encryption Service (BDESVC) is running. If not, it starts the service.

How do I fix BitLocker recovery without key? ›

If you do not have the BitLocker password and recovery key, you need to format the encrypted drive to remove the encryption or turn to third-party tools, such as Passware Kit, Elcomsoft Forensic Disk Decryptor, or Elcomsoft Distributed Password Recovery. EaseUS will provide detailed guides on how.

Can BitLocker PIN be bypassed? ›

Can BitLocker be bypassed? The answer is “Yes”. Usually, the BitLocker drive encryption doesn't ask for the recovery key on a normal startup.

Can Windows PIN be brute forced? ›

The use of a PIN doesn't compromise security, since Windows Hello has built-in brute force protection, and the PIN never leaves the device.

How many times can you try a BitLocker PIN? ›

This means that a user could quickly attempt to use a key with the wrong authorization value 32 times. For each of the 32 attempts, the TPM records if the authorization value was correct or not. This inadvertently causes the TPM to enter a locked state after 32 failed attempts.

How do I force BitLocker to ask for a PIN? ›

Enable the pre-boot PIN:
  1. Open the Local Group Policy Editor (press the key combination Windows + R, type gpedit. ...
  2. Go to Computer Configuration > Administrative Templates > Windows Components > BitLocker Drive Encryption > Operating System Drives.
  3. Double-click the Require additional authentication at the startup option.
May 16, 2024

Top Articles
How to Visualize the Real Estate Cycle - Rental Mindset
Top Weightage Stocks Trend Rupeedesk Reports - 28.12.2022
Christian McCaffrey loses fumble to open Super Bowl LVIII
Ups Stores Near
Tmf Saul's Investing Discussions
Kansas City Kansas Public Schools Educational Audiology Externship in Kansas City, KS for KCK public Schools
Star Sessions Imx
Cooking Chutney | Ask Nigella.com
Chatiw.ib
Us 25 Yard Sale Map
Samsung 9C8
Kentucky Downs Entries Today
83600 Block Of 11Th Street East Palmdale Ca
Day Octopus | Hawaii Marine Life
Bill Devane Obituary
Fire Rescue 1 Login
Hallelu-JaH - Psalm 119 - inleiding
2021 Lexus IS for sale - Richardson, TX - craigslist
Blue Beetle Showtimes Near Regal Swamp Fox
Washington, D.C. - Capital, Founding, Monumental
Healing Guide Dragonflight 10.2.7 Wow Warring Dueling Guide
180 Best Persuasive Essay Topics Ideas For Students in 2024
Craigslist Free Stuff Greensboro Nc
Xxn Abbreviation List 2023
3S Bivy Cover 2D Gen
Aldine Isd Pay Scale 23-24
Everything you need to know about Costco Travel (and why I love it) - The Points Guy
Curry Ford Accident Today
Epguides Strange New Worlds
Sea To Dallas Google Flights
Pearson Correlation Coefficient
Papa Johns Mear Me
Kristen Hanby Sister Name
67-72 Chevy Truck Parts Craigslist
Consume Oakbrook Terrace Menu
Missouri State Highway Patrol Will Utilize Acadis to Improve Curriculum and Testing Management
Pawn Shop Open Now
My.lifeway.come/Redeem
Htb Forums
Joey Gentile Lpsg
Cocaine Bear Showtimes Near Cinemark Hollywood Movies 20
Coroner Photos Timothy Treadwell
Shoecarnival Com Careers
814-747-6702
Winta Zesu Net Worth
Jaefeetz
Penny Paws San Antonio Photos
Doe mee met ons loyaliteitsprogramma | Victoria Club
26 Best & Fun Things to Do in Saginaw (MI)
Mega Millions Lottery - Winning Numbers & Results
40X100 Barndominium Floor Plans With Shop
Latest Posts
Article information

Author: Edmund Hettinger DC

Last Updated:

Views: 5896

Rating: 4.8 / 5 (78 voted)

Reviews: 85% of readers found this page helpful

Author information

Name: Edmund Hettinger DC

Birthday: 1994-08-17

Address: 2033 Gerhold Pine, Port Jocelyn, VA 12101-5654

Phone: +8524399971620

Job: Central Manufacturing Supervisor

Hobby: Jogging, Metalworking, Tai chi, Shopping, Puzzles, Rock climbing, Crocheting

Introduction: My name is Edmund Hettinger DC, I am a adventurous, colorful, gifted, determined, precious, open, colorful person who loves writing and wants to share my knowledge and understanding with you.