Cracking old cryptoloop image
#1
Back in 2009 I created a 10MiB cryptoloop image in Arch and stored it along with the following scripts:

mount.sh:
Code:
sudo modprobe loop
sudo modprobe cryptoloop
sudo modprobe blowfish

sudo losetup -e blowfish /dev/loop0 $(dirname $0)/secure.disk && \
sudo mkdir -p /media/securedisk && \
sudo mount -t ext2 /dev/loop0 /media/securedisk/

umount.sh:
Code:
sudo umount /media/securedisk/ && \
sudo losetup -d /dev/loop0 && \
sudo rmdir /media/securedisk/

The cryptoloop module has long been deprecated since then, but I'm fairly certain that the default configuration of the cryptoloop module for Blowfish encryption was a key size of 128, and a sha256 hash function. I'm aware that hashcat supports some other cryptoloop encryption algorithms such as aes, serpent, and twofish, but apparently not blowfish?

Is there a way to extract a hash from the secure.disk and crack it with hashcat somehow? The contents of the secure.disk are mostly insignificant as far as I can remember, I'm just here for the thrill of the hunt Smile
Reply