All the versions of this article: [English] [français]
Le 17/10/2011, 15:58 Luks Bruteforce : test all your passwords
A few years ago, I started using cryptographic capabilities of Linux to encrypt my usb keys, hard drives and laptop. More efficient against the usual bad guys than a root password, this gave me a pretty good privacy for personal and professional data ...
... Until that day when, after about a year without rebooting, one of my server rebooted and asked me for a passphrase ... which I obviously forgot!
I didn’t find anything on the Internet to bruteforce a Luks-encrypted partition, so here is the script I produced to help me do this efficiently ...
Brute-Force of Luks?
First and foremost, you should know that bruteforcing Luks is no easy task: the PBKDF2 norm, used by Luks, make it hard to brute-force : Luks doesn’t use the passphrase you give him as a source to decrypt data. It use your passphrase as a source for a very complex alogrithm, done a great number of times (in my case 191609 times), which, at the end, requires about 1 full second of CPU time on my server to compute the resulting key. As a result, for each pass tried on this machine, it will take 1 second to know if it’s the right one or not!
This protection is very effective to prevent the usual brute-force attack which consist of trying every possible password on a supercomputer ...
In my case, I had a pretty good idea of what could be that passphrase: "Courage is the ability to ignore your options." could be a good candidate, and "a great banker is a dead one" also ... but of course it was neither the first nor the second.
However, my passphrase could be one of those:
- Courage is the ability to ignore your options.
- Courage is the ability to ignore your options
- "Courage is the ability to ignore your options."
- courage is the ability to ignore your options.
- courage is the ability to ignore your options
- "courage is the ability to ignore your options."
- courage is the ability to ignore your option
- (Courage is the ability to ignore your option)
well... you can guess my problem: with or without quotes, or parenthesis, with or without period, coma, upcase characters etc. I had to find my passphrase among those 2 * 5 * 2^3 * 3 ... well, something like 10000 combinations...
But I really didn’t want to test them all by hand.
A program to brute-force Luks
Since I didn’t find any program on the Internet to help me bruteforcing Luks, I wrote this small php-script
Here it is for your greatest pleasure:
This script allows you to try to open a luks partition (here /dev/md1, replace it by your partition name such as /dev/sda3 or /dev/mapper/encrypted-root) by trying every possible combinations from a set of possible passphrases and their variations.
Before using it, you need to:
- replace /dev/md1 by your Luks partition;
- replace the array of arrays by each passphrase this could be, with all their variations (with or without ., () space etc.).
- replace the email address by your email: If the program find the right passphrase, it will tell you!
Launch this program, for example in a screen console, using php-cli, and let it blow your real passphrase (you will need patience, even more patience if the number of combinations is high)
This program saved me a nice bunch of personal data (here a 2TB hard drive with 15 years of photos...), enjoy it if it can help you in that way: it is distributed under GPL-v3 license.
Welcome on Benjamin Sonntag's blog, web entrepreneur, Linux expert and free-software-savvy half-geek.
Here you will find geek tuff, tricks and tips and friendly ads, personal histories and a bunch of politics ...
On the same topic ...
In the Octopuce boat ...
- 15 February – Accélérer votre réponse SSL/TLS avec l’OCSP Stapling
- 9 February – Débugger PHP en CLI avec Xdebug & Vim
- 14 September 2015 – Analyser une attaque avec les logs d’Apache2
- 30 April 2015 – Conditions générales de vente
- 7 April 2015 – Testing Augeas lenses with augparse on Debian GNU/Linux
La Quadrature du Net
- 21 October – Exégètes amateurs : victoire contre la surveillance au Conseil Constitutionnel !
- 17 October – Newsletter #74
- 14 October – Réforme de la loi de 1881 au Sénat : la liberté d'expression en danger !
- 8 October – [NextINpact] Surveillance internationale : aucun décret non publié selon le ministère de la Défense
- 6 October – [Libération] Tony Ferri : « Nous sommes tous des placés sous surveillance électronique en puissance »
Old stuff ...
- 21 janvier 2014 – Flying Robots / Buy a shotgun
- 1 February 2015 – DDOS on La Quadrature du Net, analysis
- 12 March 2014 – Ladar Levison (Lavabit) at the European Parliament
- 3 décembre 2013 – Tor, les .onion, le "darknet" à votre portée
- 12 mars 2014 – Ladar Levison (Lavabit) au Parlement Européen