解密EFS加密文件
我在旧的 Windows XP 安装上有许多使用 EFS 加密的文件。我安装了 Windows 7,但现在无法访问这些文件。您可以在此处了解整个尴尬的情况。
好消息是我有可以解密文件的密钥。我知道这一点是因为我使用了 EFS 数据恢复 并且它能够解密文件。它还确定我有一些可用的某种密钥文件(主密钥和私钥)。
这里的问题是 Elcom 想要 150 美元购买他们的工具,而我加密的东西不值 150 美元。有没有一种方法可以让我自己以编程方式完成此操作?
编辑:这个链接太棒了...EFS 恢复
I have a number of files that were encrypted using EFS on my old Windows XP installation. I installed Windows 7 and now I can't access these files. You can read about the whole embarrassing situation here.
The good news is that I have keys that will allow the files to be decrypted. I know this because I used EFS data recovery and it was able to decrypt a file. It also identified that I had some usable key files of some sort (master key and private key).
The problem here is that Elcom want's $150 for their tool and what I have encrypted is not worth $150. Is there a way that I can do this myself, programmatically?
EDIT: This link is awesome...EFS recovery
如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。
绑定邮箱获取回复消息
由于您还没有绑定你的真实邮箱,如果其他用户或者作者回复了您的评论,将不能在第一时间通知您!
发布评论
评论(2)
我找到了以下资源:
http://www.beginningtoseethelight.org/efsrecovery/
它概述了我如何可以恢复我的文件。我确实拥有所有密钥,因此我可以在必要时解密文件。然而,我放弃了这一点,因为我不想为了恢复旧系统而毁掉我现有的系统。您仍然有机会烧毁新的 Windows 安装,但我不想处理所有备份内容。
I found the following resource:
http://www.beginningtoseethelight.org/efsrecovery/
It outlined how I could recover my files. I did have all the keys so I can decrypt the files if necessary. However, I gave up on this because I didn't want to trash my existing system in order to recover the old one. There's still a chance you can torch the new Windows installation and I didn't want to deal with all the backup stuff.
我所知道的唯一其他答案是使用 Microsoft 产品支持向致电的人员提供的名为 RECCERTS.EXE 的工具。我什至无法想象,为什么人们在 EFS 上反复遇到这些问题多年之后,微软仍然没有发布这个工具作为免费下载。它会搜索它指向的任何可用文件,以查找解密和使用之前安装的操作系统用于解密系统上 EFS 加密文件的 RSA 私钥所需的密钥和元数据的所有残余部分。它工作得非常好,但从网络上的少量文档(即 MSDN 社交论坛帖子 - 最新于 2009 年)来看,只有当您能找到一种方法说服 MS 产品支持向您发送一个复制。看来这里最便宜的官方门户是 99 美元的电子邮件事件,但我想知道如果您证明这解决了您的问题,他们是否会退款(参见他们过去如何退款 - 并且可能仍然这样做 - PSS 事件,如果您能够证明您所调用的他们的软件中存在错误)。并不是说这是一个错误,只是可疑设计的痛苦副产品,该设计没有警告用户采取适当且明确的步骤来避免这些恢复噩梦。
唯一的其他可能解决方案是在网络上搜索 RECCERTS.EXE 并查看是否有任何位置可供下载。许多此类网站使用合法文件名作为“诱饵”,让您下载一些最终证明是恶意软件的内容,因此如果您采用这种方法,请务必小心。然而,如果您的时间价值低于 99 美元,那么您就面临着 Windows 安装中充满恶意软件的风险,并且必须擦除并删除所有内容。恢复系统。 [只需确保您尝试恢复的文件有一个离线副本,以防恶意软件感染或损坏这些文件的在线安装副本。]
The only other answer I know of is to use a tool called RECCERTS.EXE that Microsoft Product Support has available to those who call. I can't even begin to imagine why after years of these kinds of problems people have had with EFS over and over, Microsoft still hasn't released this tool as a free download. It searches any available files it's pointed at to look for all the remnants of the keys and metadata necessary to decrypt and use the RSA private key that your previous OS install used to decrypt the EFS-encrypted files on your system. It works awfully well, but from what little documentation there is on the web (i.e. MSDN Social forum postings - latest in 2009), it appears this tool is still only available if you can find a way to convince MS Product Support to send you a copy. It appears that the cheapest official doorway here is the $99 email incident, but I wonder if they'd refund your money if you demonstrated that this fixed your problem (cf. how they used to refund - and may still do so - PSS incidents if you were able to demonstrate that there was a bug in their software for which you're calling). Not saying this is a bug, just the painful byproduct of a dubious design that doesn't warn users to take appropriate and explicit steps to avoid these recovery nightmares.
The only other possible solution is to search the web for RECCERTS.EXE and see if there are any locations where it's been made available for download. Many of such sites use legit filenames as "lures" to get you to download something that turns out to be malware, so be very careful if you take this approach. However, if your time is worth less than $99, then you just risk hosing a Windows install with nasty malware - and having to wipe & recover the system. [Just make sure there's an offline copy of the files you're trying to recover, in case the malware infects or corrupts an online, mounted copy of those files.]