eago
eago
Please try again with latest commits
It actually found the hash for the Recovery Key attack (`======== RP VMK #0 ========`). How long is your file? The problem is that `bitcracker_hash` stores the hash into the...
It's also weird that `bitcracker_hash` didn't stop here `=====> VMK entry found at 0xbff97277 VMK encrypted with TPM...not supported! (0xbff97298)`
yes, the problem is that the file is too big. You should try to dd the image starting few bytes before offset `0xbff77000` for several KB
Looking at your password rate, it seems you're using a Pascal GPU, righr? Yes that's the problem: the set of possible Recovery Password as an enormous magnitude. I'll clarify it...
This means that there is something wrong in the format of your encrypted device. Send to me the `enc.img` file starting from image starting from address `0x17EA9E8` for about 256...
No signature in what you sent
Is the windows vista info correct ? Which authentication method did you chose to encrypt your device? What's the size of your image?
Probably metadata in your encrypted image are organized in a different way wrt tests I've done until now. May I ask you to send to me the first 256Kb of...
I'm sorry, I meant 256 KB. Yes you can attach the file here