13 January, 2026

In Part I of our Ivanti forensics series, we explored how attackers exploit Ivanti Connect Secure vulnerabilities and how investigators can extract evidence from LILO‑based appliances. This second installment moves deeper into the investigation workflow.
As exploitation campaigns continue to accelerate, especially around CVE‑2025‑0282 and related vulnerabilities, incident responders increasingly need reliable, repeatable methods to analyze Ivanti Connect Secure devices that use GRUB and LUKS‑based full‑disk encryption.
This blog builds on the foundational concepts introduced in Part I and focuses on the next step in the forensic process: obtaining recovery access on GRUB‑based appliances, extracting and decrypting LUKS‑encrypted partitions, and preparing evidence for detailed offline analysis. GRUB‑based systems introduce unique challenges and opportunities for investigators, and understanding these nuances is essential for any team responding to Ivanti VPN compromises at scale.
GRUB based Ivanti Connect Secure appliances implement full disk encryption (data at rest) using Linux Unified Key Setup (LUKS). Unlike older LILO based systems that relied on custom encryption mechanisms, the LUKS encryption keys on GRUB based systems are stored on disk and can be extracted once recovery shell access is obtained. This allows investigators to decrypt encrypted partitions using standard Linux tooling.
At the GRUB bootloader, enter recovery mode and drop into a root shell:
init=//bin/sh
This provides a privileged shell in the early boot environment, prior to enforcing higher level security controls.
Copy the LUKS key material stored on the appliance:
cp /etc/lvmkey /tmp/luks_keys
This key file is required to decrypt the encrypted disk partitions offline.
Use the same network-based extraction steps described in Method 1, specifically:
• From Method 1 – Step 4: Network interface configuration on the appliance
• From Method 1 – Step 5: Netcat listener setup on the forensic collection host
• From Method 1 – Step 8: dd based raw extraction of encrypted block devices
These steps are reused to stream raw, encrypted LUKS partitions and the luks_keys from the appliance to the forensic collection host.
On the forensic workstation, decrypt the extracted partition using standard Linux tools:
cryptsetup luksOpen --key-file=luks_keys /dev/sdaX decrypted_partition
mount /dev/mapper/decrypted_partition /mnt/forensic_analysis
Once mounted, the decrypted filesystem can be examined using conventional forensic and incident response techniques.
In Part III of this series, we examine techniques for extracting the Ivanti snapshot, decrypting the acquired image, and preparing it for detailed forensic analysis.
Resources
This forensic investigation guide and vulnerability analysis incorporates research and tools developed by:
Ivanti/Pulse Secure Vulnerability Research
watchTowr Labs – Exploitation Walkthrough and Techniques: Ivanti Connect Secure RCE (CVE-2025-0282)
https://labs.watchtowr.com/exploitation-walkthrough-and-techniques-ivanti-connect-secure-rce-cve-2025-0282/#:~:text=Building%20The%20Exploit,for%20the%20readers%20at%20home
watchTowr Labs – CVE-2024-22024 (SAML XXE) Analysis
https://labs.watchtowr.com/are-we-now-part-of-ivanti/
Volexity – Active Exploitation of Ivanti Connect Secure VPNs
https://www.volexity.com/blog/2024/01/10/active-exploitation-of-ivanti-connect-secure-vpn/
Volexity – CVE-2023-46805 Authentication Bypass
https://www.cve.org/CVERecord?id=CVE-2023-46805
Northwave Security – Ivanti/Pulse Secure forensic tooling and analysis
https://northwave-cybersecurity.com/whitepapers-articles/investigating-a-possible-ivanti-compromise
Black Hat and historical context
Orange Tsai & Meh Chang – Infiltrating Corporate Intranet Like NSA (Black Hat USA 2019)
https://www.blackhat.com/us-19/briefings/schedule/#infiltrating-corporate-intranet-like-nsa-16202
https://www.youtube.com/watch?v=mKGq8z17Kd4
Web shell references
FireEye/Mandiant – China Chopper Web Shell Analysis
Breaking Down the China Chopper Web Shell - Part I |
Mandiant | Google Cloud Blog: https://cloud.google.com/blog/topics/threat-intelligence/breaking-down-china-chopper-web-shell-part-i
Breaking Down the China Chopper Web Shell - Part II
https://cloud.google.com/blog/topics/threat-intelligence/breaking-down-the-china-chopper-web-shell-part-ii
https://www.volexity.com/blog/2024/01/15/ivanti-connect-secure-vpn-exploitation-goes-global/
https://github.com/stephen-murcott/Ivanti-ICT-Snapshot-decryption