WD 2.1.6.x Advanced Tutorial of WD USB Drives

There is a HDD KEY list, WD Security cryptographic security system will store EDEK data within the disk, and EDEK data is needed when decrypting.

A new KEY will be generated combined with EDEK data and user password and it will be used to decrypt the correct data out.

Click “Auto Check”, EDEK data will be obtained automatically and saved as a file, so next time, we can try to use “Loaded from the file” option. When clicking “Auto Check”, if “Ignore self encryption” is not selected, software will detect this kind of KEY with first priority; if it is not selected, software will ignore the detection of the KEY type with “self encryption”.

If the user does not know whether “Ignore self encryption” should be selected, we would like to suggest to click it on first, then try to read out sector 0 and see whether the data is correct or not. If the data is wrong, then click this option off, and check the data in sector 0 again. In other words, we need to try different option combinations, and use the combination which can decrypt the data successfully.

Click “OK” when all options are set; and we can click “Cancel” to cancel all settings.

Decryption video link of encrypted WD USB drives basing on old MRT version

http://us.mrtlab.com/video/wdcusbdecryptionen.rar

 
Domain name: www.mrtlab.com | | Telephone: +86-27-82621261 | Terms of use
MRT data recovery website,provides professional HDD firmware repair and data recovery technical resources!
Copyright 2003-2019 Powered By MrtLab