Wrong password printed for LUKS -m 14600 - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Support (https://hashcat.net/forum/forum-3.html) +--- Forum: hashcat (https://hashcat.net/forum/forum-45.html) +--- Thread: Wrong password printed for LUKS -m 14600 (/thread-11679.html) Pages:
1
2
|
Wrong password printed for LUKS -m 14600 - Zarhi - 11-02-2023 Hello, I have old PC with Fedora 16 (Verne) with forgotten LUKS password. I try to recover it with hashcat 6.2.6 but there is a problem: On fedora 16: # dd if=/dev/zero of=test_luks bs=32M count=1 # cryptsetup luksFormat test_luks with password 'abcdefg_22!' Then transfer test_luks to my work PC, RockyLinux 9.2, NVIDIA Corporation TU104GL [Quadro RTX 4000] (rev a1) Result from hashcat: Quote:# cat a.dict # ./hashcat -m 14600 test_luks -1 '~!_#2' -a 6 a.dict ?1?1?1?1 hashcat (v6.2.6) starting CUDA API (CUDA 12.3) ==================== * Device #1: Quadro RTX 4000, 7877/7974 MB, 36MCU OpenCL API (OpenCL 3.0 CUDA 12.3.68) - Platform #1 [NVIDIA Corporation] ======================================================================= * Device #2: Quadro RTX 4000, skipped Minimum password length supported by kernel: 0 Maximum password length supported by kernel: 256 Hashes: 1 digests; 1 unique digests, 1 unique salts Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates Optimizers applied: * Zero-Byte * Single-Hash * Single-Salt * Slow-Hash-SIMD-LOOP ATTENTION! Potfile storage is disabled for this hash mode. Passwords cracked during this session will NOT be stored to the potfile. Consider using -o to save cracked passwords. Watchdog: Temperature abort trigger set to 90c Host memory required for this attack: 1412 MB Dictionary cache hit: * Filename..: a.dict * Passwords.: 1 * Bytes.....: 8 * Keyspace..: 625 The wordlist or mask that you are using is too small. This means that hashcat cannot use the full parallel power of your device(s). Unless you supply more work, your cracking speed will drop. For tips on supplying more work, see: https://hashcat.net/faq/morework Approaching final keyspace - workload adjusted. test_luks:abcdefg2222 Session..........: hashcat Status...........: Cracked Hash.Mode........: 14600 (LUKS v1 (legacy)) Hash.Target......: test_luks Time.Started.....: Thu Nov 2 11:01:18 2023 (1 sec) Time.Estimated...: Thu Nov 2 11:01:19 2023 (0 secs) Kernel.Feature...: Pure Kernel Guess.Base.......: File (a.dict), Left Side Guess.Mod........: Mask (?1?1?1?1) [4], Right Side Guess.Charset....: -1 ~!_#2, -2 Undefined, -3 Undefined, -4 Undefined Speed.#1.........: 1 H/s (0.33ms) @ Accel:8 Loops:128 Thr:512 Vec:1 Recovered........: 1/1 (100.00%) Digests (total), 1/1 (100.00%) Digests (new) Progress.........: 1/625 (0.16%) Rejected.........: 0/1 (0.00%) Restore.Point....: 0/1 (0.00%) Restore.Sub.#1...: Salt:0 Amplifier:0-1 Iteration:186880-186999 Candidate.Engine.: Device Generator Candidates.#1....: abcdefg2222 -> abcdefg2222 Hardware.Mon.#1..: Temp: 60c Fan: 30% Util: 62% Core:1920MHz Mem:6500MHz Bus:16 Started: Thu Nov 2 11:00:35 2023 Stopped: Thu Nov 2 11:01:20 2023 Runnig with -d 2 (OpenCL) print same result. Testing on Rocky 9: # echo 'abcdefg_22!' | cryptsetup luksOpen --test-passphrase test_luks test # echo 'abcdefg2222' | cryptsetup luksOpen --test-passphrase test_luks test No key available with this passphrase. Do I make some mistake? RE: Wrong password printed for LUKS -m 14600 - v71221 - 11-03-2023 To simplify, I would try wordlist attack mode (not hybrid). Create wordlist with these words abcdefg_!_! abcdefg2222 abcdefg_22! Run the attack and post the results here, please RE: Wrong password printed for LUKS -m 14600 - Zarhi - 11-06-2023 Quote:# cat t.dict Same result with -a 0: Quote:./hashcat -m 14600 test_luks -a 0 t.dict RE: Wrong password printed for LUKS -m 14600 - Snoopy - 11-06-2023 well thats strange, i cannot even crack my testsetup, tried mode 14600 and the newer one 29521, dict and bruteforce no hit can you please upload your test_luks file anywhere? i feel it kinda strange that none of my setups produces a cracked pass RE: Wrong password printed for LUKS -m 14600 - Zarhi - 11-08-2023 https://cloud.zarhi.com/s/EGoWSJWKPxnrqHG Same results are with 5.1.0 and 4.2.1. Lower versions does not compile on my system. RE: Wrong password printed for LUKS -m 14600 - Snoopy - 11-10-2023 well now thats a strange behavior, setup: hahscat 6.2.6 (and beta) bruteforce, mode 14600, mask abcdefg?s?d?d?s, --keep-guessing test_luks:abcdefg#96! test_luks:abcdefg{30# test_luks:abcdefg;36~ test_luks:abcdefg=08} test_luks:abcdefg%72 then i extracted the hash using the python-tool, same setup, mode 25911 abcdefg?26- abcdefg;86) abcdefg-00\ abcdefg~64< abcdefg^48[ rerun this on different systems and using different backends CPU, GPU, opencl, cuda resulting in multiple similar outputs maybe some of the devs can exlpain why this happen? RE: Wrong password printed for LUKS -m 14600 - b8vr - 11-11-2023 (11-10-2023, 02:06 PM)Snoopy Wrote: well now thats a strange behavior, This could maybe be a keyboard layout issue. When creating a bootable LUKS partition, LUKS is changing the layout to english/US, meaning that if you have a different keyboard, you think you are supplying some specific characters, but if those characters are placed differently from an english/US keyboard, the password will actually contain the characters of the english/US layout. RE: Wrong password printed for LUKS -m 14600 - Zarhi - 11-11-2023 Result are not consistent: ./hashcat -m 14600 test_luks -a 0 example.dict --keep-guessing First run: Quote:test_luks:1024ens Second run: Quote:test_luks:051304 Third run: Quote:test_luks:06081961 And so on. adding -w3, -S, -D2 ( Intel OpenCL on Xeon CPU) gives same random results. RE: Wrong password printed for LUKS -m 14600 - Snoopy - 11-13-2023 after reporting this issue atom came up with the reason/explanation why this happen please see https://github.com/hashcat/hashcat/issues/3903 and https://hashcat.net/forum/thread-6225.html the problem seems, that the luks drive has to be a valid filesystem, see the 6225 thread on this why/how atom worked out the attackvector for luks, i was unaware on this one this is also the problem why i cant crack my own setup, because i followed your setup without formatting the luksdrive RE: Wrong password printed for LUKS -m 14600 - Banaanhangwagen - 11-14-2023 FYI, the tool "luks2hashcat.py" mentions the fact that there is a initialization error... |