chrisddom / luks-volume-cracker

Automatically exported from code.google.com/p/luks-volume-cracker
0 stars 0 forks source link

Cannot open a LUKS partition #1

Open GoogleCodeExporter opened 9 years ago

GoogleCodeExporter commented 9 years ago
Hi Chris, I wrote you a FB message, but not everyone check's their FB messages, 
so I thought I'd open an issue.

I'm trying to dictionary attack my own LUKS volume that I forgot the password 
to, and I'm looking for some help with your luks-cracker program. It's a strong 
password, but I know all of the main words that will be in it, so a dictionary 
attack seems like it will suffice.

I'm running Windows 7 64-bit. I manually enabled test driver signing using 
bcdedit, then installed freeOTFE from their project's website to ensure the 
drivers were installed. It's a default AES encrypted volume, so I disabled the 
superfluous drivers as indicated in the readme. I can click "mount partition" 
in freeOTFE and it asks me for a key when I select the correct partition, but 
when I open Luks-volume-Cracker and select volume, I don't see any way to 
select this partition. All I see is a regular windows file browser, and the 
only drives shown are the regular NTFS drives with assigned drive letters. I'm 
definitely missing something here. Any thoughts/suggestions?

Thank you,
~Zachariah

Original issue reported on code.google.com by zachk...@craniumcomputing.com on 21 Nov 2012 at 7:15

GoogleCodeExporter commented 9 years ago
Hi just to let you know I've seen this (I've been away) and will reply properly 
by Wednesday.

Couple of quick questions, 
Is the volume you are trying to crack an image file or a raw drive? I tested 
the program on files (created by Linux dd command or 
http://sourceforge.net/projects/windd/)
I've uploaded a test case that it should be able to crack quickly, does it work 
for you? 
http://code.google.com/p/luks-volume-cracker/downloads/detail?name=testcase.zip&
can=2

Original comment by Mail...@gmail.com on 26 Nov 2012 at 5:13

GoogleCodeExporter commented 9 years ago
It's a raw drive. I ended up writing a batch file with a for loop that reads 
through a password file one line at a time, and executes freeOTFE by command 
line pointing it at the correct partition. It worked (mostly), but it was a 
slow process as the program dialog came up on every attempt despite having set 
the silent switch.

From what I can gather, there is no way to point the your Luks-volume-cracker 
at a specific partition, as it uses the windows file explorer to choose it's 
target. 

Original comment by zachk...@craniumcomputing.com on 26 Nov 2012 at 10:41

GoogleCodeExporter commented 9 years ago
It sounds like you have been successful, though if not I remember seeing a 
linux shell script floating about that brute forces luks.
Some more will likely be released today when the dc3 contest results are 
announced (I believe that AlephZero has a nice shell script).

Yes it was intended to crack images - I can see that in real world cases 
physical drive selection is required and I will add this. I believe it could be 
done in the existing program by entering the drive id, though this is hardly 
user friendly.
Luks-Crack closes that linux prompt automatically using the windows automation 
api.

Original comment by Mail...@gmail.com on 3 Dec 2012 at 2:09