Extract hash with T2 - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Support (https://hashcat.net/forum/forum-3.html) +--- Forum: hashcat (https://hashcat.net/forum/forum-45.html) +--- Thread: Extract hash with T2 (/thread-11747.html) |
Extract hash with T2 - MikhailPole - 12-30-2023 What if i build apfs2john for macos and run it with terminal via MacOS recovery system. Will i get successfull extract hash for file vault? I have mac 2019 pro with T2 and lost access to my data due forgot all passwords. But i need to restore it. And now i trying to find way for it. Thank you for help. RE: Extract hash with T2 - MikhailPole - 01-03-2024 State of my task is next . I successfull extracted EncryptedRoot.plist.wipekey from preboot volume after it was mounted. Next step was make image volume of MacHDData which is file vault encrypted. I made this, but mmls, hdiutil and same else tools are not seeing there file system. Apfs2hashcat or john returned me "Initialization of KeyManager failed. Unable to init container. " My research lead me to conclusion that image i got is encrypted also with T2 chip while imaging or something else way. I already know about checkm8 and checkra1n projects which like i understand could to beat T2 encryption or get me ssh access to root but i dont understand what i could make with this. I have full access to my recovery os, also on this macbook installed ubuntu, maybe i dont need to make image and i could to use it directly for brute force. But question stay there, how i could to extract hash from ssd with T2 chip? RE: Extract hash with T2 - Banaanhangwagen - 01-04-2024 (01-03-2024, 01:09 PM)MikhailPole Wrote: how i could to extract hash from ssd with T2 chip? at my knowledge, it's not possible (on the other hand, there is a commercial tool Passware that does some low-speed-guessing when dealing with T2) |