bruteforce-luks icon indicating copy to clipboard operation
bruteforce-luks copied to clipboard

bruteforce-force found password but ...

Open yazmindelene opened this issue 4 years ago • 1 comments

It found out the password using just the luks header. Using: "sudo dd if=/dev/sda5 of=/tmp/luks-header bs=1M count=10" "bruteforce-luks -t 4 -l x -m x -b "abcde123" /tmp/luks-header" password found

but in device /dev/sda5 did not work: $ sudo cryptsetup open /dev/sda5 luksrecoverytarget --type luks Enter passphrase for /dev/sda5: No key available with this passphrase. Enter passphrase for /dev/sda5: No key available with this passphrase. Enter passphrase for /dev/sda5: No key available with this passphrase.

What now?

Thank you for your help

yazmine

yazmindelene avatar Jun 04 '21 16:06 yazmindelene

This is strange, if bruteforce-luks can decrypt a key slot, cryptestup should be able to do it too as they use the same function internally. Are you sure that you typed the exact password that was found by bruteforce-luks? Maybe the password contains an invisible character, like a space for example...

glv2 avatar Jul 21 '21 14:07 glv2