Need HELP - Im Close to the right Password form my SSD
#1
Rainbow 
Hello HashCats,

I forgot my password from my new Luke SSD but i know mutch about it.
Please help me with the right Charset and Mask Syntax (or else).


How can i BrutForce only Passwords with the follow parts nothing other:
"123" "qwe" "456" "!"

as Example the Password looks close to:
123!456qwe123!
123!qwe!456!qwe

The Password length is 12 - 15
-i --increment-min 12 --increment-max 15

Iam far away from the right solution with:
Code:
sudo ./hashcat.bin -a 3 -m 14600 /dev/sda1 -1 '123' -2 '123qwe!' 123?2?2?2?2?2?2?2?2?2?2 -i --increment-min 12 --increment-max 15


How can i BruteForce only with the Parts i set?


Thank you for reading,
have a nice time.
Reply
#2
Using princeprocessor with a dictionary of words consisting of:
123
qwe
456
!
Pipe princeprocessor into hashcat.

More info:
https://reusablesec.blogspot.com/2014/12...rince.html
Reply
#3
(08-22-2022, 11:11 PM)walterlacka Wrote: Using princeprocessor with a dictionary of words consisting of:
123
qwe
456
!
Pipe princeprocessor into hashcat.

More info:
https://reusablesec.blogspot.com/2014/12...rince.html

Thank you very mutch, this way looks good.
i will try to got it next time and let you know what i done.
Reply
#4
Rainbow 
Okay here is my way i tryed, Hashcat work very nice and fast.
But i found not the right Password. Can someone please check my step 3 and 4?

At the botom you can see the informations of my Luks partition maybe the solution is to change something in step 3 or 4, else i must try other parts in step 1.


Step 1:
Code:
# cat my-word-list.txt
123
qwe
546
!

Step 2:
Code:
# sudo princeprocessor --elem-cnt-min=4 --elem-cnt-max=10 --pw-min=12 --pw-max=22 my-word-list.txt > price-list.txt

Step 3:
Code:
# sudo dd if=/dev/sda1 of=my-sda1.luks bs=512 count=4097

Step 4:
Code:
# sudo ./hashcat-6.2.5/hashcat.bin -a 0 -m 14600 my-sda1.luks price-list.txt

Informations about my Luks partition
Code:
# sudo cryptsetup luksDump /dev/sda1
LUKS header information for /dev/sda1

Version: 1
Cipher name: aes
Cipher mode: xts-plain64
Hash spec: sha256
Payload offset: 4096
MK bits: 512
MK digest: a4 f2 5c 3e 6f 47 e5 bb 9d ad d8 35 0d 3f 21 71 4f 47 ab a4
MK salt: 10 f6 89 8d e1 45 51 84 96 f9 b9 63 1e 08 b6 1a
18 00 25 1f 98 89 cd a4 94 2b fd cd 96 a1 48 86
MK iterations: 76027
UUID: fed4cf2f-38b4-4cbd-bc0d-xxxxxxxxxxxxx

Key Slot 0: ENABLED
Iterations: 1179500
Salt: d2 84 ee dc 53 28 5e 8f 51 5f ed b4 6a 13 1f c2
5e 61 e9 42 7a 17 b0 51 9a 58 33 f6 85 ed 8e ac
Key material offset: 8
AF stripes: 4000
Key Slot 1: DISABLED
Key Slot 2: DISABLED
Key Slot 3: DISABLED
Key Slot 4: DISABLED
Key Slot 5: DISABLED
Key Slot 6: DISABLED
Key Slot 7: DISABLED


Thank you very mutch for reading,
have a nice day Smile
Reply