02-18-2025, 12:17 PM
Back in 2009 I created a 10MiB cryptoloop image in Arch and stored it along with the following scripts:
mount.sh:
umount.sh:
The cryptoloop module has long been deprecated since then, but I'm fairly certain that the default configuration of the cryptoloop module for Blowfish encryption was a key size of 128, and a sha256 hash function. I'm aware that hashcat supports some other cryptoloop encryption algorithms such as aes, serpent, and twofish, but apparently not blowfish?
Is there a way to extract a hash from the secure.disk and crack it with hashcat somehow? The contents of the secure.disk are mostly insignificant as far as I can remember, I'm just here for the thrill of the hunt
mount.sh:
Code:
sudo modprobe loop
sudo modprobe cryptoloop
sudo modprobe blowfish
sudo losetup -e blowfish /dev/loop0 $(dirname $0)/secure.disk && \
sudo mkdir -p /media/securedisk && \
sudo mount -t ext2 /dev/loop0 /media/securedisk/
umount.sh:
Code:
sudo umount /media/securedisk/ && \
sudo losetup -d /dev/loop0 && \
sudo rmdir /media/securedisk/
The cryptoloop module has long been deprecated since then, but I'm fairly certain that the default configuration of the cryptoloop module for Blowfish encryption was a key size of 128, and a sha256 hash function. I'm aware that hashcat supports some other cryptoloop encryption algorithms such as aes, serpent, and twofish, but apparently not blowfish?
Is there a way to extract a hash from the secure.disk and crack it with hashcat somehow? The contents of the secure.disk are mostly insignificant as far as I can remember, I'm just here for the thrill of the hunt
