Wrong password printed for LUKS -m 14600
#13
So, it's my mistake, sorry about that.

I miss this because in hashcat 6.2.6 luks2hashcat.py does not have warning about non formated filesystem.

In fact I missed that because my original drive may be formatted too long ago, probably on Centos 5/Core2duo cpu and have only 10 MK iterations. I was unaware about this shortcut not to calculate second PBKDF2 to confirm MK checksum.

Code:
LUKS header information for md0_luks_1

Version:        1
Cipher name:    aes
Cipher mode:    cbc-essiv:sha256
Hash spec:      sha1
Payload offset: 1032
MK bits:        128
MK digest:      3c 8e aa 1a 36 29 39 65 a0 03 06 73 98 46 1a 23 84 29 1c c8
MK salt:        45 3d 49 ec db a4 58 79 9f 98 23 0c 47 3b 90 13
                c4 0f d8 19 4c cd 5f c7 3d de 3d 5f 0d 11 90 32
MK iterations:  10
UUID:          a4f293aa-e54d-4264-8a57-1451bd0b2539

Key Slot 0: ENABLED
        Iterations:            189075
        Salt:                  c2 78 7c 9f 5a d2 d0 4a c1 50 23 00 26 ec 4d f2
                                76 3e df 06 3e fe 9a 6b 6a 2b 45 68 a0 47 9e e0
        Key material offset:    8
        AF stripes:            4000
Key Slot 1: DISABLED
Key Slot 2: DISABLED
Key Slot 3: DISABLED
Key Slot 4: DISABLED
Key Slot 5: DISABLED
Key Slot 6: DISABLED
Key Slot 7: DISABLED
Reply


Messages In This Thread
RE: Wrong password printed for LUKS -m 14600 - by Zarhi - 11-15-2023, 10:53 AM