03-26-2023, 07:31 PM 
(This post was last modified: 03-26-2023, 07:42 PM by hashcatUser94712.)
		
	
	
		Im trying to crack an older 500mb luks partition i made many years ago (~2017) -  First are my 2x questions,  below that are the relevant details / info.
2x questions:
1- Even though Luks v1 / SHA-1 / AES / XTS_Plain64 - does NOT seem to be covered by any modes of: -m 29511 through -m 29543 , will -m 14600 still work ? (assuming the correct passphrase gets tried, ofcourse)
2- what is the relevance of Luks v1 / SHA-1 / AES / XTS_Plain64 - NOT being covered by one of the 29511 through 29543 modes? (are those faster modes vs 14600 ? what is the advantage of ever using -m 29511 vs -m 14600 if i were to have a VALID "29511 - LUKS v1 SHA-1 + AES" supported hash?
NB: based upon the sample hash for Mode 29511 , cbc-plain64 is expected vs my hash which used XTS_Plain64
from: https://hashcat.net/misc/example_hashes/...64_128.txt
via: https://hashcat.net/wiki/doku.php?id=example_hashes
My details:
---
ID luks partition/device (just confirmation):
blkid -t TYPE=crypto_LUKS -o device
/dev/sdc1
I extracted the luks v1 header:
dd if=/dev/sdc1 bs=1 count=2066432 of=luksHeader.dd
Verify my header extract is valid:
Convert the header to a hashcat Hast file:
python3.6 luks2hashcat.py luksHeader.dd > out.hash
(nb; for luk2hashcat.py to execute: i first had to run/install : pip install dataclasses OR pip3 install dataclasses else i would get: ModuleNotFoundError: No module named 'dataclasses' )
cat out.hash:
$luks$1$Hash.SHA1$Cipher.AES$Mode.XTS_PLAIN64$256$250000$3ef2a97..................
readable: Luks v1 / SHA-1 / AES / XTS_Plain64
Mode 29511 will fail as it does not support XTS_PLAIN64:
hashcat -O -S -m 29511 -a 0 -w 3 -r blah.rule out.hash MYwordlist.txt
This does not fail / nor throw an error (however i have yet to crack it so far):
hashcat -O -S -m 14600 -a 0 -w 3 -r blah.rule luksHeader.dd MYwordlist.txt
or this also does not fail / nor throw an error:
hashcat -O -S -m 14600 -a 0 -w 3 -r blah.rule out.hash MYwordlist.txt
thanks for the help and your time.
( Great reference links for others / future):
https://hashcat.net/forum/thread-6225-po...l#pid33187
https://diverto.github.io/2019/11/18/Cra...assphrases
	
	
	
	
2x questions:
1- Even though Luks v1 / SHA-1 / AES / XTS_Plain64 - does NOT seem to be covered by any modes of: -m 29511 through -m 29543 , will -m 14600 still work ? (assuming the correct passphrase gets tried, ofcourse)
2- what is the relevance of Luks v1 / SHA-1 / AES / XTS_Plain64 - NOT being covered by one of the 29511 through 29543 modes? (are those faster modes vs 14600 ? what is the advantage of ever using -m 29511 vs -m 14600 if i were to have a VALID "29511 - LUKS v1 SHA-1 + AES" supported hash?
NB: based upon the sample hash for Mode 29511 , cbc-plain64 is expected vs my hash which used XTS_Plain64
from: https://hashcat.net/misc/example_hashes/...64_128.txt
via: https://hashcat.net/wiki/doku.php?id=example_hashes
My details:
---
ID luks partition/device (just confirmation):
blkid -t TYPE=crypto_LUKS -o device
/dev/sdc1
I extracted the luks v1 header:
dd if=/dev/sdc1 bs=1 count=2066432 of=luksHeader.dd
Verify my header extract is valid:
Code:
cryptsetup luksDump ./luksHeader.dd 
LUKS header information for ./luksHeader.dd 
Version:        1
Cipher name:    aes
Cipher mode:    xts-plain64
Hash spec:      sha1
Payload offset: 4096
MK bits:        256
MK digest:      d9 a3 5b c8 7a bc 00 dd 19 4a 28 27 6c b8 44 a8 14 68 80 a5
MK salt:        fe ec 4e f6 53 14 48 06 c7 e6 9f 8e 46 df fd 29
                d8 a9 45 8a 46 75 d4 88 93 43 6b fc 2e 10 f9 43
MK iterations:  63625
UUID:          88bcb795-e366-4dda-9998-fbf6b5fd0c84
Key Slot 0: ENABLED
        Iterations:            250000
        Salt:                  3e f2 a9 79 d4 52 e8 36 39 3e 79 20 90 5d f8 b5
                                3c 87 0e 35 cf 6b 12 3f 6a 4c 85 91 b4 5f 04 2f
        Key material offset:    8
        AF stripes:            4000
Key Slot 1: DISABLED
Key Slot 2: DISABLED
Key Slot 3: DISABLED
Key Slot 4: DISABLED
Key Slot 5: DISABLED
Key Slot 6: DISABLED
Key Slot 7: DISABLEDConvert the header to a hashcat Hast file:
python3.6 luks2hashcat.py luksHeader.dd > out.hash
(nb; for luk2hashcat.py to execute: i first had to run/install : pip install dataclasses OR pip3 install dataclasses else i would get: ModuleNotFoundError: No module named 'dataclasses' )
cat out.hash:
$luks$1$Hash.SHA1$Cipher.AES$Mode.XTS_PLAIN64$256$250000$3ef2a97..................
readable: Luks v1 / SHA-1 / AES / XTS_Plain64
Mode 29511 will fail as it does not support XTS_PLAIN64:
hashcat -O -S -m 29511 -a 0 -w 3 -r blah.rule out.hash MYwordlist.txt
Code:
[2023-03-25 18:53:55]  Counting lines in out.hash Please be patient...
Counted lines in out.hash 
[b]Hashfile ' out.hash ' on line 1 ($luks$...76074b9aa95bee61f69f5c23cbcf7471): Signature unmatched[/b]
[2023-03-25 18:53:55]  Parsing Hashes: 0/1 (0.00%)...
No hashes loaded.This does not fail / nor throw an error (however i have yet to crack it so far):
hashcat -O -S -m 14600 -a 0 -w 3 -r blah.rule luksHeader.dd MYwordlist.txt
or this also does not fail / nor throw an error:
hashcat -O -S -m 14600 -a 0 -w 3 -r blah.rule out.hash MYwordlist.txt
thanks for the help and your time.
( Great reference links for others / future):
https://hashcat.net/forum/thread-6225-po...l#pid33187
https://diverto.github.io/2019/11/18/Cra...assphrases
 
 

 
