Extract hash with T2
#2
State of my task is next . I successfull extracted EncryptedRoot.plist.wipekey from preboot volume after it was mounted. Next step was make image volume of MacHDData which is file vault encrypted. I made this, but mmls, hdiutil and same else tools are not seeing there file system. Apfs2hashcat or john returned me
"Initialization of KeyManager failed.
Unable to init container.
"
My research lead me to conclusion that image i got is encrypted also with T2 chip while imaging or something else way. I already know about checkm8 and checkra1n projects which like i understand could to beat T2 encryption or get me ssh access to root but i dont understand what i could make with this. I have full access to my recovery os, also on this macbook installed ubuntu, maybe i dont need to make image and i could to use it directly for brute force. But question stay there, how i could to extract hash from ssd with T2 chip?
Reply


Messages In This Thread
Extract hash with T2 - by MikhailPole - 12-30-2023, 10:20 PM
RE: Extract hash with T2 - by MikhailPole - 01-03-2024, 01:09 PM
RE: Extract hash with T2 - by Banaanhangwagen - 01-04-2024, 09:24 AM