Brute force mask
#1
Hi. I got an HDD encrypted by luksCrypt using over 40 chars passphrase. I've gotten this password. Not at all but I badly remember one or two characters. For example my password is:

$BW5eLqAEKYw\:26l,`WSNle\q3R,39Z?:*.cIQi

How can I do a brute force attack on it testing:

1. Upper/lower cases variations:
$Bw5eLqAEKYw\:26l,`WSNle\q3R,39Z?:*.cIQi
$bW5eLqAEKYw\:26l,`WSNle\q3R,39Z?:*.cIQi
and so on.

2. All 1337 variations ( 3 instead of E, 1 instead of i and so on), example:
$BW5eLqA3KYw\:26l,`WSNle\q3R,39Z?:*.cIQi

3. All Shift button variations, example 4 instead of $, / instead of ? and so on

4. All other missclick/misspress of buttons, example A, W, D instead of each S in my pass, j,m,l,o,i,u instead of k and so on.

Is there any pattern?
Thanks in advance for your reply
Best regards
Reply


Messages In This Thread
Brute force mask - by KR2615 - 03-05-2023, 12:18 PM
RE: Brute force mask - by marc1n - 03-05-2023, 12:26 PM
RE: Brute force mask - by KR2615 - 03-05-2023, 06:33 PM
RE: Brute force mask - by Snoopy - 03-06-2023, 03:30 PM