In-depth technology research: finding new ways to recover data, accessing firmware, writing programs, reading bits off the platter, recovering data from dust.
Please do not post
questions about data recovery cases here (use this forum
instead). This forum is for topics on finding new ways to recover data. Accessing firmware, writing programs, reading bits off the platter, recovering data from dust...
May 23rd, 2019, 3:01
The following thread appears to confirm that the WD drives in a "My Book Pro Duo" RAID store the encryption key and RAID metadata in firmware modules 25h and 38h. Transferring these two modules, and module 02, to two clone drives enabled the cloned RAID array to be detected and decrypted by the enclosure.
SED WD "My Book Pro Duo" RAID:https://groups.google.com/forum/#!topic/datarecoverycertification/mmoEbpk-x0E
Here is a 16TB My Book Duo with two HGST/WD helium drives:https://www.datarecoveryguru.com/blog/2019/5/17/how-to-recover-data-from-a-raid0-wd-my-book-duo-with-x2-8tb-wd-red-helium-hard-drives
ISTM that if one were to intercept the SATA interface with a protocol analyser, one may see the VSCs that the bridge transmits to the drive when these firmware modules are updated. Could this be the secret to cracking this new architecture?
Powered by phpBB © phpBB Group.