12-09-2022, 02:34 AM
Your articles were super helpful, i really managed to copy the header. What kinda confuses me is that when i looked at the header it was saying:
Cipher: aes
Hash: sha256
after looking at the other article where it shows all the different attack modes for hashes i would have thought i need 25921 Luks 1 sha256 + aes but when i try to crack it with this setting it always says that its the wrong hash type. The 14600 works though.
But thanks very much. I think i can now create the second header from my test Luks and try to crack that first. So i know iam doing things right. If that works i can probably also crack the important one.
Iam just curious if there is still a rule to use with a mask attack to let hashcat know that every character is there only one time? I still couldnt find something about that topic.
Cipher: aes
Hash: sha256
after looking at the other article where it shows all the different attack modes for hashes i would have thought i need 25921 Luks 1 sha256 + aes but when i try to crack it with this setting it always says that its the wrong hash type. The 14600 works though.
But thanks very much. I think i can now create the second header from my test Luks and try to crack that first. So i know iam doing things right. If that works i can probably also crack the important one.
Iam just curious if there is still a rule to use with a mask attack to let hashcat know that every character is there only one time? I still couldnt find something about that topic.
Code:
Version: 1
Cipher name: aes
Cipher mode: xts-plain64
Hash spec: sha256
Payload offset: 4096
MK bits: 512
MK digest: ab 97 40 bb 32 64 8e 0f 9e 93 d0 f0 18 2b 05 9c 92 0c 9e bc
MK salt: b2 0d 5a 74 dc f7 fe 33 06 e4 c1 fa e9 a9 3f 92
e4 63 91 58 0b c4 4d c9 93 3d e1 74 9a d2 89 eb
MK iterations: 26383
UUID: 9ef1e435-9dfc-4b87-a000-d3acc6c6288c
Key Slot 0: ENABLED
Iterations: 424180
Salt: 28 59 21 5d 4e c2 cf 58 90 16 04 dc ad 4d 24 04
a4 72 ab 49 0f 33 ca 44 e4 f1 6c b0 12 48 3f e3
Key material offset: 8
AF stripes: 4000