APFS encrypted device with T2-Chip
#1
Following to this post, I successfully extracted an apfs-hash with apfs2hashcat and was able to attack it with hashcat (there was no T2-chip installed). Now the question arises how the hash behaves when a T2 chip is installed in the Macbook? Can you still read out the hash like that or what should i watch out for?
Is there anything to be considered when restoring the password or can you attack as usual, for example with wordlists and rules?
Reply


Messages In This Thread
APFS encrypted device with T2-Chip - by matt99 - 02-06-2020, 04:50 PM
RE: APFS encrypted device with T2-Chip - by Zen6 - 01-08-2021, 11:06 PM