hashcat Forum
Wrong password printed for LUKS -m 14600 - Printable Version

+- hashcat Forum (https://hashcat.net/forum)
+-- Forum: Support (https://hashcat.net/forum/forum-3.html)
+--- Forum: hashcat (https://hashcat.net/forum/forum-45.html)
+--- Thread: Wrong password printed for LUKS -m 14600 (/thread-11679.html)

Pages: 1 2


RE: Wrong password printed for LUKS -m 14600 - Snoopy - 11-14-2023

(11-14-2023, 03:53 PM)Banaanhangwagen Wrote: FYI, the tool "luks2hashcat.py" mentions the fact that there is a initialization error...

i tried it right now again and there is no such warning/error message when running the tool (win and linux)


RE: Wrong password printed for LUKS -m 14600 - Banaanhangwagen - 11-14-2023

The tool got updated more than a year ago; do you have the latest version?
https://github.com/hashcat/hashcat/commit/5b0ef28432c2d175e94d3302c2039ed73531191d


RE: Wrong password printed for LUKS -m 14600 - Zarhi - 11-15-2023

So, it's my mistake, sorry about that.

I miss this because in hashcat 6.2.6 luks2hashcat.py does not have warning about non formated filesystem.

In fact I missed that because my original drive may be formatted too long ago, probably on Centos 5/Core2duo cpu and have only 10 MK iterations. I was unaware about this shortcut not to calculate second PBKDF2 to confirm MK checksum.

Code:
LUKS header information for md0_luks_1

Version:        1
Cipher name:    aes
Cipher mode:    cbc-essiv:sha256
Hash spec:      sha1
Payload offset: 1032
MK bits:        128
MK digest:      3c 8e aa 1a 36 29 39 65 a0 03 06 73 98 46 1a 23 84 29 1c c8
MK salt:        45 3d 49 ec db a4 58 79 9f 98 23 0c 47 3b 90 13
                c4 0f d8 19 4c cd 5f c7 3d de 3d 5f 0d 11 90 32
MK iterations:  10
UUID:          a4f293aa-e54d-4264-8a57-1451bd0b2539

Key Slot 0: ENABLED
        Iterations:            189075
        Salt:                  c2 78 7c 9f 5a d2 d0 4a c1 50 23 00 26 ec 4d f2
                                76 3e df 06 3e fe 9a 6b 6a 2b 45 68 a0 47 9e e0
        Key material offset:    8
        AF stripes:            4000
Key Slot 1: DISABLED
Key Slot 2: DISABLED
Key Slot 3: DISABLED
Key Slot 4: DISABLED
Key Slot 5: DISABLED
Key Slot 6: DISABLED
Key Slot 7: DISABLED



RE: Wrong password printed for LUKS -m 14600 - Snoopy - 11-15-2023

(11-14-2023, 09:37 PM)Banaanhangwagen Wrote: The tool got updated more than a year ago; do you have the latest version?
https://github.com/hashcat/hashcat/commit/5b0ef28432c2d175e94d3302c2039ed73531191d

despite the fact that i also tried the beta version of hashcat, i used the python script directly shipped with hashcat 6.2.6, so i missed that update for the script itself

but good to know