brute force attack on linux encrypted volume

[FnG]magnolia;28771886 said:
I imagine the request is in relation to the recent events described in these posts:

http://forums.overclockers.co.uk/showthread.php?t=18699992

http://forums.overclockers.co.uk/showthread.php?t=18697027

http://forums.overclockers.co.uk/showthread.php?t=18696020

I've no idea how to help you and I don't even understand what you're asking but there are clever people on these forums so it might be useful to give them some info to work with, edscdk :)

Definitely to do with this, OP wants to probably find out any info / why which is fair enough I'd do exactly the same....

In that case OP seriously ask on more specialized forums hopefully you find someone who can help.
 
If you have a drive the contents of which are so important to you that you're willing to spend £15K now plus unspecified upgrade costs over time plus the costs of running powerful hardware at full speed 24/7 for years and you're willing to wait 10 years to decrypt the drive...you'd have to be very silly to not clone the drive. I'd clone it half a dozen times and store the copies in different locations. The contents would be far too important to risk losing them to drive failure, theft or destruction.

You're right. I was thinking of efficiency for the decryption process. Not the need to preserve the original (which you would need to do for an investigation) or for the simple risk of drive failure over time. I'd be looking to remove hard drive activity from the cracking process almost entirely. And only be going back to the drive for the final decryption.

As for edscdk - best of luck with your endevour.
 
Any dons on want to lock this thread, in 6 months, ill give a Don the rough outline and take a Permaban and 3 poos via letter box if they don't agree they would do the same?

Well I'll buy a top end video card ~£300 to be given to a forum member using some method devised by the dons?
The government is trying to ban encryption because the GCHQ can't do it even with their super computers.
You want to try with a £300 graphics card?
 
The government is trying to ban encryption because the GCHQ can't do it even with their super computers.
You want to try with a £300 graphics card?

Quite feasible in certain circumstances and well worth a shot in the OPs case.

I would work on it for days, months, years in the OPs case and would probably end up becoming an expert in security/encryption because of the time I'd spend on something like this :D.

I wonder if you could get an Amazon or other VM cluster going and get them all attacking it at the same time, or at least a portion of it.

OP, you need to approach some more specialised forums/people.
 
[FnG]magnolia;28771886 said:
I imagine the request is in relation to the recent events described in these posts:

http://forums.overclockers.co.uk/showthread.php?t=18699992

http://forums.overclockers.co.uk/showthread.php?t=18697027

http://forums.overclockers.co.uk/showthread.php?t=18696020

I've no idea how to help you and I don't even understand what you're asking but there are clever people on these forums so it might be useful to give them some info to work with, edscdk :)

Well spotted Mag. Sorry to hear about your brother OP, but a word of caution (without sounding to melodramatic) these people who put your brother in that awful position - are you certain they aren't likely to come across a thread like this on a public forum and put 2 and 2 together? I'd hazard a guess if they are the type of people you describe then they are quite capable of exerting the same force on you - maybe?

That's assuming you are trying to your own bit of detective work. If that really is what you are doing you'd be far better/safer doing it a bit more discreetly.
 
Only pedos and spies encrypt their hdds, and anyone wanting to but too stupid to is an MP (usually trying to hide their expences / bribes) anyone with 2 levels of encryption is a pedos priest MP, spying for the Chinese government.

I keep my files in bit locker, on a true crypt partition, in an encrypted zip file, as attachments in a encrypted word document on my customers magnesium booby trapped ssd, in a safe... Under water...

Are you after a spy?
 
Heck if you know a person well enough you can narrow down the attack majority of people even when they use different passwords for accounts will use a similar structure for them. If you can find any previous passwords and find similarities that is.

Doesn't help deducing the encryption though.
 
Back
Top Bottom