hashcat Forum
Hashcat 7.1.2 - LUKS V2 Issue - Printable Version

+- hashcat Forum (https://hashcat.net/forum)
+-- Forum: Support (https://hashcat.net/forum/forum-3.html)
+--- Forum: hashcat (https://hashcat.net/forum/forum-45.html)
+--- Thread: Hashcat 7.1.2 - LUKS V2 Issue (/thread-13618.html)



Hashcat 7.1.2 - LUKS V2 Issue - thegpfury - 05-17-2026

Hi,

I'm trying to use Hashcat to do a dictionary attack on a volume that I apparently lost the password to. 

Here's what I'm doing and what I'm getting:

cryptsetup luksDump for the volume:
UKS header information
Version:        2
Epoch:          3
Metadata area:  16384 [bytes]
Keyslots area:  16744448 [bytes]
UUID:           120c05ee-88ae-4ac1-babb-e9aac56c6c19
Label:          (no label)
Subsystem:      (no subsystem)
Flags:          (no flags)

Data segments:
 0: crypt
       offset: 16777216 [bytes]
       length: (whole device)
       cipher: aes-xts-plain64
       sector: 4096 [bytes]

Keyslots:
 0: luks2
       Key:        512 bits
       Priority:   normal
       Cipher:     aes-xts-plain64
       Cipher key: 512 bits
       PBKDF:      argon2id
       Time cost:  9
       Memory:     1048576
       Threads:    4
       Salt:       05 06 90 e4 a1 25 85 e1 d1 5e 39 51 de f0 48 4c  
                   79 de f8 b9 37 2d 3f 93 a2 1c d1 ef 3f e7 58 fd  
       AF stripes: 4000
       AF hash:    sha512
       Area offset:32768 [bytes]
       Area length:258048 [bytes]
       Digest ID:  0
Tokens:
Digests:
 0: pbkdf2
       Hash:       sha512
       Iterations: 360583
       Salt:       8a ec b3 78 87 58 97 98 3d 7b cc 7b 76 d1 53 ba  
                   30 b4 ce 7f 0d b2 56 c3 2e 87 6f ab 0e f6 d6 df  
       Digest:     3f ff f9 22 2c e1 13 b2 3f 19 6d 0c 96 dd c7 ee  
                   f7 c5 2b 9e c4 f6 44 80 52 7d 0a d6 60 92 7f b9  
                   67 78 5f 19 80 4a 3f ee e6 48 6a 4a 66 f8 c5 dc  
                   71 93 ff 21 1d d9 5b 87 2e 71 fc 84 bf fe 4d 97


I then ran luks2hashcat.py on the volume and piped it with > to luks.hash. 

Then, I ran 
sudo ./hashcat.bin -a 0 -m 34100 luks.hash p.txt 

p.txt is my password manager export of passwords. 

I receive this error:

Hashfile 'md.hash' on line 1 ($luks$...21dd732703d6aabce6dc5d8a3108a336): Signature unmatched

Hash file starts with:

$luks$2$argon2id$sha512$aes$xts-plain64$512$m=1048576,t=9,p=(then 262,143 characters) 

Am I doing something wrong? 


RE: Hashcat 7.1.2 - LUKS V2 Issue - b8vr - 05-17-2026

LUKS2 using SHA512 is not yet supported. Mode 34100 is for SHA256.


RE: Hashcat 7.1.2 - LUKS V2 Issue - thegpfury - 05-17-2026

(37 minutes ago)b8vr Wrote: LUKS2 using SHA512 is not yet supported. Mode 34100 is for SHA256.

Ahhh, gotcha! 

Is that on the roadmap?


RE: Hashcat 7.1.2 - LUKS V2 Issue - b8vr - 05-17-2026

(35 minutes ago)thegpfury Wrote:
(37 minutes ago)b8vr Wrote: LUKS2 using SHA512 is not yet supported. Mode 34100 is for SHA256.

Ahhh, gotcha! 

Is that on the roadmap?

Don't know unfortunately, but I imagine it is.