![]() |
Cracking old cryptoloop image - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Support (https://hashcat.net/forum/forum-3.html) +--- Forum: hashcat (https://hashcat.net/forum/forum-45.html) +--- Thread: Cracking old cryptoloop image (/thread-12514.html) |
Cracking old cryptoloop image - 8m28lppaz - 02-18-2025 Back in 2009 I created a 10MiB cryptoloop image in Arch and stored it along with the following scripts: mount.sh: Code: sudo modprobe loop umount.sh: Code: sudo umount /media/securedisk/ && \ The cryptoloop module has long been deprecated since then, but I'm fairly certain that the default configuration of the cryptoloop module for Blowfish encryption was a key size of 128, and a sha256 hash function. I'm aware that hashcat supports some other cryptoloop encryption algorithms such as aes, serpent, and twofish, but apparently not blowfish? Is there a way to extract a hash from the secure.disk and crack it with hashcat somehow? The contents of the secure.disk are mostly insignificant as far as I can remember, I'm just here for the thrill of the hunt ![]() |