glv2 / bruteforce-luks

Try to find the password of a LUKS encrypted volume.
GNU General Public License v3.0
244 stars 34 forks source link

bruteforce-force found password but ... #32

Open yazmindelene opened 3 years ago

yazmindelene commented 3 years ago

It found out the password using just the luks header. Using: "sudo dd if=/dev/sda5 of=/tmp/luks-header bs=1M count=10" "bruteforce-luks -t 4 -l x -m x -b "abcde123" /tmp/luks-header" password found

but in device /dev/sda5 did not work: $ sudo cryptsetup open /dev/sda5 luksrecoverytarget --type luks Enter passphrase for /dev/sda5: No key available with this passphrase. Enter passphrase for /dev/sda5: No key available with this passphrase. Enter passphrase for /dev/sda5: No key available with this passphrase.

What now?

Thank you for your help

yazmine

glv2 commented 3 years ago

This is strange, if bruteforce-luks can decrypt a key slot, cryptestup should be able to do it too as they use the same function internally. Are you sure that you typed the exact password that was found by bruteforce-luks? Maybe the password contains an invisible character, like a space for example...