Wrong password printed for LUKS -m 14600
#1
Hello,

I have old PC with Fedora 16 (Verne) with forgotten LUKS password.

I try to recover it with hashcat 6.2.6 but there is a problem:

On fedora 16:
# dd if=/dev/zero of=test_luks bs=32M count=1
# cryptsetup luksFormat test_luks

with password 'abcdefg_22!'

Then transfer test_luks to my work PC, RockyLinux 9.2, NVIDIA Corporation TU104GL [Quadro RTX 4000] (rev a1)

Result from hashcat:

Quote:# cat a.dict  
abcdefg
# ./hashcat -m 14600 test_luks  -1 '~!_#2' -a 6 a.dict ?1?1?1?1
hashcat (v6.2.6) starting

CUDA API (CUDA 12.3)
====================
* Device #1: Quadro RTX 4000, 7877/7974 MB, 36MCU

OpenCL API (OpenCL 3.0 CUDA 12.3.68) - Platform #1 [NVIDIA Corporation]
=======================================================================
* Device #2: Quadro RTX 4000, skipped

Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 256

Hashes: 1 digests; 1 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates

Optimizers applied:
* Zero-Byte
* Single-Hash
* Single-Salt
* Slow-Hash-SIMD-LOOP

ATTENTION! Potfile storage is disabled for this hash mode.
Passwords cracked during this session will NOT be stored to the potfile.
Consider using -o to save cracked passwords.

Watchdog: Temperature abort trigger set to 90c

Host memory required for this attack: 1412 MB

Dictionary cache hit:
* Filename..: a.dict
* Passwords.: 1
* Bytes.....: 8
* Keyspace..: 625

The wordlist or mask that you are using is too small.
This means that hashcat cannot use the full parallel power of your device(s).
Unless you supply more work, your cracking speed will drop.
For tips on supplying more work, see: https://hashcat.net/faq/morework

Approaching final keyspace - workload adjusted.         

test_luks:abcdefg2222                                   
                                                         
Session..........: hashcat
Status...........: Cracked
Hash.Mode........: 14600 (LUKS v1 (legacy))
Hash.Target......: test_luks
Time.Started.....: Thu Nov  2 11:01:18 2023 (1 sec)
Time.Estimated...: Thu Nov  2 11:01:19 2023 (0 secs)
Kernel.Feature...: Pure Kernel
Guess.Base.......: File (a.dict), Left Side
Guess.Mod........: Mask (?1?1?1?1) [4], Right Side
Guess.Charset....: -1 ~!_#2, -2 Undefined, -3 Undefined, -4 Undefined
Speed.#1.........:        1 H/s (0.33ms) @ Accel:8 Loops:128 Thr:512 Vec:1
Recovered........: 1/1 (100.00%) Digests (total), 1/1 (100.00%) Digests (new)
Progress.........: 1/625 (0.16%)
Rejected.........: 0/1 (0.00%)
Restore.Point....: 0/1 (0.00%)
Restore.Sub.#1...: Salt:0 Amplifier:0-1 Iteration:186880-186999
Candidate.Engine.: Device Generator
Candidates.#1....: abcdefg2222 -> abcdefg2222
Hardware.Mon.#1..: Temp: 60c Fan: 30% Util: 62% Core:1920MHz Mem:6500MHz Bus:16

Started: Thu Nov  2 11:00:35 2023
Stopped: Thu Nov  2 11:01:20 2023


Runnig with -d 2 (OpenCL) print same result.

Testing on Rocky 9:
# echo 'abcdefg_22!' | cryptsetup luksOpen --test-passphrase test_luks test
# echo 'abcdefg2222' | cryptsetup luksOpen --test-passphrase test_luks test
No key available with this passphrase.


Do I make some mistake?
Reply


Messages In This Thread
Wrong password printed for LUKS -m 14600 - by Zarhi - 11-02-2023, 01:23 PM