WD 2.1.6.x Advanced Tutorial of WD USB Drives

Guessed scope settings:

1. Explanation of character location: for example, if the password is “abcdefg”, the address of Character “a” is 0, so the address of Character “d” is 3.

2. Setting rules of guessed scope: for example, if the password is “abcdefg”, and we can only remember the first three characters, so we can input “abc” in “Fill password background characters with (hex)” and input “3” in “Starting address of exhaustion character” and fill “4” in “Exhaustion character number”. If we forget “abc” but remember “defg”, then we need to leave the first three characters blank and input “defg” in “Fill password background characters with (hex)” and input “0” in “Starting address of exhaustion character” and fill “3” in “Exhaustion character number”.

3. What we have mentioned above is the starting address and length of the guessed password, and the filling requirements of the guessed character. Next we are going to set the characters that may appear in the guessed password. In the panel list, all the alphabets, numbers and specific characters are included and selected by default. If the guessed password only includes numbers or minuscules, then other characters can be cleared and we just need to select numbers or minuscules. If some specified characters are remembered, they can be filled in “specified character” and separated with coma, such as “1,2,a,b”; then click to select “specified character” to make these characters selected in the list.

Multi-machine and multi-task settings:

If only one machine is needed and no special requirements, we can directly use the default settings.

For the task amount of current machine, it is better to use the default number which is set according to the CPU core number. If the number is less than the default number, it will decrease the efficiency. And if the number is more than the default number, it will bring little benefits either. However, if we do not want this function to occupy so much CPU resources, we can decrease the number. If there is just one machine, then the number needs to be consistent with the actual number.
When we need to retrieve the password with more than one machine simultaneously, we can refer to the way below:

If we need eight tasks and two machines to work at the same time, the “Total task amount of machine” should be filled with “8” for both of the two machines. At this time, if both the two machines are assigned with four tasks, “Stating number of current machine task” should be filled with “0” for the first machine and “4” for the second machine.

If the “Total task amount of current machine” is “2” for the first machine, the “Stating number of current machine task” should be filled with “2” and the “Total task amount of current machine” for the second machine should be “6”.

Rules: when the task of more than one machine is being set, “Total task amount of machine” should be consistent for every machine. “Stating number of current machine task” of the machine behind is the sum of the total task amount of all the machines.

Viewing, saving and loading progress:

It may take a long time to do the task of guessing a password. Therefore, viewing progress can let us know the progress. Saving and loading progress can make it possible to stop the task and save the task progress when it is not convenient for us. And when we need to continue the task, we can load the progress aga.

Instructions of viewing progress:

If there are five characters to enumerate and all minuscules, 26 alphabets, are selected, the alphabets will be arranged randomly at the place of the five characters until all possibilities are tested. If there is just one task, then the task progress will be performed from 0,0,0,0,0 ->0,0,0,0,1->0,0,0,0,2 … ->0,0,0,0,26 -> 0,0,0,1,0 … >0,0,0,1,26 to 26,26,26,26. When the first number becomes 1, the whole progress has performed 1/26.

The time the task has taken will show above the progress list. We can estimate the whole time of completing the guessing task according to the shown time and the task progress.

Decryption video link of encrypted WD USB drives basing on old MRT version

http://us.mrtlab.com/video/wdcusbdecryptionen.rar

The above all are the contents of advanced data recovery tutorial of encrypted WD USB drives, thanks for your reading.

 

Decryption settings are not complicated. There is a user password box, input the password here if the user have set one. If not, we do not have to input anything.

There is an option named “Try to use inbuilt USER KEY” on the right, which is clicked by default. It is recommended to click this option on if the user does not input a password.

 
Domain name: www.mrtlab.com | | Telephone: +86-27-82621261 | Terms of use
MRT data recovery website,provides professional HDD firmware repair and data recovery technical resources!
Copyright 2003-2019 Powered By MrtLab