brute force attack on linux encrypted volume

Soldato
Joined
17 Jul 2008
Posts
7,439
Long story but...

if / when I get the drive back I want to try and brute force the volume,

it's a bootable OS drive running linux,

All I know is its an encrypted volume (I don't know what method or any other variables)

where do I start? as in

1) I assume I have to install a linux rig to mount the volume and attack it from
2) should I tool up with a couple of top end video cards? (I don't mind spending 10K / 15K on a rig)
3) any good places to calculate possible hash rates (if its going to be 100 years ill not bother if its 10 ill get started, and upgrade the hardware every few years)
4) any good further reading?
5) any suggested software?
 
You will wanna use your GPU to do a brute force. If you don't know what the encryption method is, you are not going to to get very far.

can the method be worked out when you have a bootable OS? (bootable an OS login screen) there are probably between 1 and 1000 billion possible passwords, quite possibly to the lower end of the scale - i know the format of other passwords used
 
Last edited:
Hashcat

http://calc.opensecurityresearch.com/

Have fun op.

Could take you the next 10, 000 years depending on password. Also you can buy for services on-line that will break passes for you, they use a server farm to speed up the process.... not that I know about any of this. Trolol.

its a fair bet its a word with a number at the end (a very week password) there are only 1 million words in English x 3 - 6 numbers at the end.. so i think that makes 1 billion to 1000 billion ish.. (or i might be doing my maths wrong)
 
1 trillion is a lot, such numbers make me dizzy. Have to ask though, what the hell is so important you're willing to spend 10 years getting into it. I mean you know we need to know more information so we can 'help' you with correct methods.

well I'm not spending 10 years of my time I just keep the rig running and spend a few hours upgrading every year or 2, just the cost of electricity... and id obviously not expect 10 years id hope for a lot less
 
You need to know the encryption algorithm and key strength to calculate this. It could range from a realistic time frame to many times the age of the universe on current hardware.

encryption algorithm i assume cannot be determined so its not really doable then?
 
And what if the power supply is cut or you suffer a hardware failure during that time, would you know how to recover or would you start over?

And what makes you think it'll be 10 years, the odds are drastically against you, you'll likely be waiting all your life for nothing. It's not feasible.

I think you need to call it a day.

Id like to think the software could use a log to know where it go to.

I said if its possibly only a 10 year (with today hardware) project it might be worth starting, with the increases in performance time will decrease.. its not like im dedicating my life to the project... just press the button and check every week to make sure its still running... if it costs me a few K in electricity over the next few years its worth it
 
Any dons on want to lock this thread, in 6 months, ill give a Don the rough outline and take a Permaban and 3 poos via letter box if they don't agree they would do the same?

Well I'll buy a top end video card ~£300 to be given to a forum member using some method devised by the dons?

don will need to remember to contact me in 6 months to put up or get out...
 
Back
Top Bottom