brute force attack on linux encrypted volume

Any dons on want to lock this thread, in 6 months, ill give a Don the rough outline and take a Permaban and 3 poos via letter box if they don't agree they would do the same?

Well I'll buy a top end video card ~£300 to be given to a forum member using some method devised by the dons?

don will need to remember to contact me in 6 months to put up or get out...

3 whole poos?
 
Any dons on want to lock this thread, in 6 months, ill give a Don the rough outline and take a Permaban and 3 poos via letter box if they don't agree they would do the same?

Well I'll buy a top end video card ~£300 to be given to a forum member using some method devised by the dons?

don will need to remember to contact me in 6 months to put up or get out...

Genuinely no idea what you're trying to say in this post. :confused:
 
Any dons on want to lock this thread, in 6 months, ill give a Don the rough outline and take a Permaban and 3 poos via letter box if they don't agree they would do the same?

Well I'll buy a top end video card ~£300 to be given to a forum member using some method devised by the dons?

don will need to remember to contact me in 6 months to put up or get out...

Can we just ban him now for not telling us what he's trying to get a hold of?

:mad:
 
Did he have any other pc's that might have some internet history or if he had a google account it might have a record of his search history. Might shed some light on where he might have researched the encryption method. What if he just encrypted it to protect against online access to it, he might have used the serial number or a family name or written the encryption phrase down in some paper work.
 
dd the drive into a file and put said file on one of these:

https://www.overclockers.co.uk/inte...id-state-drive-ssdpedmw400g4x1-hd-069-in.html

Alternatively If the drive is small enough create a ram drive and place it on there.

Create one or more loopback mounts with said file.

You *may* have a slim hope of identifying the encryption method (depending on what was used) by looking at key locations in the drive image. IMO think about the owners personality. Chances are they would have used TrueCrypt with default settings? Is it Windows then clearly bitlocker (although you said linux so I doubt it).

Someone already linked to Rainbow Tables. This is your best chance once you have an angle of attack. But you will still need to either write or download appropriate high speed decryption tests with a reliable method of detecting the decryption and hope to god it isn't a paranoid guy with more than one layer of encryption.

Good luck.
 
Last edited:
Why would you clone the drive? You wouldn't brute force the whole drive everytime, you'd brute force one section of the drive in memory.

If you have a drive the contents of which are so important to you that you're willing to spend £15K now plus unspecified upgrade costs over time plus the costs of running powerful hardware at full speed 24/7 for years and you're willing to wait 10 years to decrypt the drive...you'd have to be very silly to not clone the drive. I'd clone it half a dozen times and store the copies in different locations. The contents would be far too important to risk losing them to drive failure, theft or destruction.
 
dd the drive into a file and put said file on one of these:

https://www.overclockers.co.uk/inte...id-state-drive-ssdpedmw400g4x1-hd-069-in.html

Alternatively If the drive is small enough create a ram drive and place it on there.

Create one or more loopback mounts with said file.

You *may* have a slim hope of identifying the encryption method (depending on what was used) by looking at key locations in the drive image. IMO think about the owners personality. Chances are they would have used TrueCrypt with default settings? Is it Windows then clearly bitlocker (although you said linux so I doubt it).

Someone already linked to Rainbow Tables. This is your best chance once you have an angle of attack. But you will still need to either write or download appropriate high speed decryption tests with a reliable method of detecting the decryption and hope to god it isn't a paranoid guy with more than one layer of encryption.

Good luck.
Not sure how a rainbow table can help on this one. It isn't a password hash he is trying to reverse as he doesn't have the password.
 
[FnG]magnolia;28771886 said:
I imagine the request is in relation to the recent events described in these posts:

http://forums.overclockers.co.uk/showthread.php?t=18699992

http://forums.overclockers.co.uk/showthread.php?t=18697027

http://forums.overclockers.co.uk/showthread.php?t=18696020

I've no idea how to help you and I don't even understand what you're asking but there are clever people on these forums so it might be useful to give them some info to work with, edscdk :)

Damn, sounds like he is taking it pretty hard.
 
Going by the previous threads shown above -

My brother was recently put in a position where he had to kill himself buy some rather nasty people.

I'm going to hazard a guess that you hope to find some evidence on these nasty people ?

Sorry for your loss :(
 
Back
Top Bottom