Wrong password printed for LUKS -m 14600
#3
Quote:# cat t.dict
abcdefg_!_!
abcdefg2222
abcdefg_22!

# ./hashcat  -m 14600 test_luks -a 3 t.dict
hashcat (v6.2.6) starting

CUDA API (CUDA 12.3)
====================
* Device #1: Quadro RTX 4000, 7877/7974 MB, 36MCU

OpenCL API (OpenCL 3.0 CUDA 12.3.68) - Platform #1 [NVIDIA Corporation]
=======================================================================
* Device #2: Quadro RTX 4000, skipped

Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 256

Hashes: 1 digests; 1 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates

Optimizers applied:
* Zero-Byte
* Single-Hash
* Single-Salt
* Brute-Force
* Slow-Hash-SIMD-LOOP

ATTENTION! Potfile storage is disabled for this hash mode.
Passwords cracked during this session will NOT be stored to the potfile.
Consider using -o to save cracked passwords.

Watchdog: Temperature abort trigger set to 90c

Host memory required for this attack: 1412 MB

The wordlist or mask that you are using is too small.
This means that hashcat cannot use the full parallel power of your device(s).
Unless you supply more work, your cracking speed will drop.
For tips on supplying more work, see: https://hashcat.net/faq/morework

Approaching final keyspace - workload adjusted.         

test_luks:abcdefg_!_!                                   
                                                         
Session..........: hashcat
Status...........: Cracked
Hash.Mode........: 14600 (LUKS v1 (legacy))
Hash.Target......: test_luks
Time.Started.....: Mon Nov  6 08:04:34 2023 (1 sec)
Time.Estimated...: Mon Nov  6 08:04:35 2023 (0 secs)
Kernel.Feature...: Pure Kernel
Guess.Mask.......: abcdefg_!_! [11]
Guess.Queue......: 1/3 (33.33%)
Speed.#1.........:        1 H/s (0.04ms) @ Accel:64 Loops:16 Thr:512 Vec:1
Recovered........: 1/1 (100.00%) Digests (total), 1/1 (100.00%) Digests (new)
Progress.........: 1/1 (100.00%)
Rejected.........: 0/1 (0.00%)
Restore.Point....: 0/1 (0.00%)
Restore.Sub.#1...: Salt:0 Amplifier:0-1 Iteration:186992-186999
Candidate.Engine.: Device Generator
Candidates.#1....: abcdefg_!_! -> abcdefg_!_!
Hardware.Mon.#1..: Temp: 61c Fan: 30% Util: 54% Core:1920MHz Mem:6500MHz Bus:16

Started: Mon Nov  6 08:04:32 2023
Stopped: Mon Nov  6 08:04:36 2023

Same result with -a 0:
Quote:./hashcat -m 14600 test_luks -a 0 t.dict
Approaching final keyspace - workload adjusted.

test_luks:abcdefg_!_!

Session..........: hashcat
Status...........: Cracked
Hash.Mode........: 14600 (LUKS v1 (legacy))
Hash.Target......: test_luks
Time.Started.....: Mon Nov 6 08:18:18 2023 (1 sec)
Time.Estimated...: Mon Nov 6 08:18:19 2023 (0 secs)
Kernel.Feature...: Pure Kernel
Guess.Base.......: File (t.dict)
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........: 4 H/s (0.16ms) @ Accel:128 Loops:64 Thr:64 Vec:1
Recovered........: 1/1 (100.00%) Digests (total), 1/1 (100.00%) Digests (new)
Progress.........: 4/4 (100.00%)
Rejected.........: 0/4 (0.00%)
Restore.Point....: 0/4 (0.00%)
Restore.Sub.#1...: Salt:0 Amplifier:0-1 Iteration:186944-186999
Candidate.Engine.: Device Generator
Candidates.#1....: abcdefg_!_! ->
Hardware.Mon.#1..: Temp: 60c Fan: 30% Util: 54% Core:1920MHz Mem:6500MHz Bus:16
Reply


Messages In This Thread
RE: Wrong password printed for LUKS -m 14600 - by Zarhi - 11-06-2023, 10:03 AM