Posts: 3
Threads: 1
Joined: Aug 2022
08-22-2022, 09:08 PM
(This post was last modified: 08-22-2022, 10:35 PM by criptoon.)
Hello HashCats,
I forgot my password from my new Luke SSD but i know mutch about it.
Please help me with the right Charset and Mask Syntax (or else).
How can i BrutForce only Passwords with the follow parts nothing other:
"123" "qwe" "456" "!"
as Example the Password looks close to:
123!456qwe123!
123!qwe!456!qwe
The Password length is 12 - 15
-i --increment-min 12 --increment-max 15
Iam far away from the right solution with:
Code:
sudo ./hashcat.bin -a 3 -m 14600 /dev/sda1 -1 '123' -2 '123qwe!' 123?2?2?2?2?2?2?2?2?2?2 -i --increment-min 12 --increment-max 15
How can i BruteForce only with the Parts i set?
Thank you for reading,
have a nice time.
Posts: 63
Threads: 10
Joined: Nov 2017
Using princeprocessor with a dictionary of words consisting of:
123
qwe
456
!
Pipe princeprocessor into hashcat.
More info:
https://reusablesec.blogspot.com/2014/12...rince.html
Posts: 3
Threads: 1
Joined: Aug 2022
(08-22-2022, 11:11 PM)walterlacka Wrote: Using princeprocessor with a dictionary of words consisting of:
123
qwe
456
!
Pipe princeprocessor into hashcat.
More info:
https://reusablesec.blogspot.com/2014/12...rince.html
Thank you very mutch, this way looks good.
i will try to got it next time and let you know what i done.
Posts: 3
Threads: 1
Joined: Aug 2022
10-19-2022, 10:15 AM
(This post was last modified: 10-19-2022, 10:20 AM by criptoon.)
Okay here is my way i tryed, Hashcat work very nice and fast.
But i found not the right Password. Can someone please check my step 3 and 4?
At the botom you can see the informations of my Luks partition maybe the solution is to change something in step 3 or 4, else i must try other parts in step 1.
Step 1:
Code:
# cat my-word-list.txt
123
qwe
546
!
Step 2:
Code:
# sudo princeprocessor --elem-cnt-min=4 --elem-cnt-max=10 --pw-min=12 --pw-max=22 my-word-list.txt > price-list.txt
Step 3:
Code:
# sudo dd if=/dev/sda1 of=my-sda1.luks bs=512 count=4097
Step 4:
Code:
# sudo ./hashcat-6.2.5/hashcat.bin -a 0 -m 14600 my-sda1.luks price-list.txt
Informations about my Luks partition
Code:
# sudo cryptsetup luksDump /dev/sda1
LUKS header information for /dev/sda1
Version: 1
Cipher name: aes
Cipher mode: xts-plain64
Hash spec: sha256
Payload offset: 4096
MK bits: 512
MK digest: a4 f2 5c 3e 6f 47 e5 bb 9d ad d8 35 0d 3f 21 71 4f 47 ab a4
MK salt: 10 f6 89 8d e1 45 51 84 96 f9 b9 63 1e 08 b6 1a
18 00 25 1f 98 89 cd a4 94 2b fd cd 96 a1 48 86
MK iterations: 76027
UUID: fed4cf2f-38b4-4cbd-bc0d-xxxxxxxxxxxxx
Key Slot 0: ENABLED
Iterations: 1179500
Salt: d2 84 ee dc 53 28 5e 8f 51 5f ed b4 6a 13 1f c2
5e 61 e9 42 7a 17 b0 51 9a 58 33 f6 85 ed 8e ac
Key material offset: 8
AF stripes: 4000
Key Slot 1: DISABLED
Key Slot 2: DISABLED
Key Slot 3: DISABLED
Key Slot 4: DISABLED
Key Slot 5: DISABLED
Key Slot 6: DISABLED
Key Slot 7: DISABLED
Thank you very mutch for reading,
have a nice day