Open cloud1250x4 opened 6 years ago
It actually found the hash for the Recovery Key attack (======== RP VMK #0 ========
). How long is your file? The problem is that bitcracker_hash
stores the hash into the output .txt
when reaching the end of the file. I should change it and print the hash immediately
It's also weird that bitcracker_hash
didn't stop here =====> VMK entry found at 0xbff97277 VMK encrypted with TPM...not supported! (0xbff97298)
The file is 1000gb.. And I think it crashed when I looked at it this morning..
Also.. I've got a gtx 1080.. Any chance I can recover my files this year? (Using the recovery key attack)
Edit: maybe I should try to dd a smaller part of my partition and recover the hash using it?
yes, the problem is that the file is too big. You should try to dd the image starting few bytes before offset 0xbff77000
for several KB
It actually finished the next morning.. I'm currently running the attack.. But it's quite slow.. Is there any hope of retrieving my files..
This seems like an insane amount of time..
Looking at your password rate, it seems you're using a Pascal GPU, righr? Yes that's the problem: the set of possible Recovery Password as an enormous magnitude. I'll clarify it in the README
you're using a Pascal GPU, righr? Yes that's the problem: the set of possible Recovery Password as an enormous magnitude. I'll clarify it in the README
The readme (now?) seems to state the Pascal GPU in Performance section. Should this issue be marked resolved/closed?
Just wondering.. is there any hope?
Also, how long can it takes..