cryptsetup-nuke-keys
cryptsetup-nuke-keys copied to clipboard
A patch for cryptsetup which adds the option to nuke all keyslots given a certain passphrase.
Can i use this also on a usb drive that is not a kali boot/install disk, for example on a usb stick that has secret files but no OS, would...
Does this repo have a maintainer? Because it doesn't seem to get updated. Are updates only handled privately? (there has to be updates, because kali ships an updated version of...
Example output: ``` % VERBOSE=1 BREAK=1 ./test.sh >>> Making a temporary "disk" for testing... truncate -s 8M /tmp/tmp.gUz94xPebl/disk >>> Creating some dummy secret data... dd if=/dev/urandom of=/tmp/tmp.gUz94xPebl/secrets bs=1M count=1 1+0...
Just a pure rebase, no additional changes like in #6
Hey guys, I updated the patch to work with the latest version of cryptsetup (1.7.5) what do you think?
Cryptsetup is now at version 1.7.2. Is there going to be a patch for that?
``` # Adding new keyslot, existing passphrase provided,new passphrase provided. # action crypt_keyslot_add_by_passphrase CRYPT_ACTIVATE_NUKE. # action crypt_keyslot_add_by_passphrase. # Trying to open key slot 0 [ACTIVE_LAST]. # Reading key slot 0...
…+nuke_keys.diff Update required for cryptsetup 1.6.7. Specific changes are to the libcryptsetup.h.patch, commit made for AUR package can be found here: https://aur4.archlinux.org/cgit/aur.git/diff/libcryptsetup.h.patch?h=cryptsetup-nuke-keys&id=f55657b1ca4b843f29e45e07c516f8646b4054fe