Open yazmindelene opened 3 years ago
This is strange, if bruteforce-luks can decrypt a key slot, cryptestup should be able to do it too as they use the same function internally. Are you sure that you typed the exact password that was found by bruteforce-luks? Maybe the password contains an invisible character, like a space for example...
It found out the password using just the luks header. Using: "sudo dd if=/dev/sda5 of=/tmp/luks-header bs=1M count=10" "bruteforce-luks -t 4 -l x -m x -b "abcde123" /tmp/luks-header" password found
but in device /dev/sda5 did not work: $ sudo cryptsetup open /dev/sda5 luksrecoverytarget --type luks Enter passphrase for /dev/sda5: No key available with this passphrase. Enter passphrase for /dev/sda5: No key available with this passphrase. Enter passphrase for /dev/sda5: No key available with this passphrase.
What now?
Thank you for your help
yazmine