This shows you the differences between two versions of the page.
john:OpenCL-BitLocker [2017/12/19 14:24] elenago [Recovery Password authentication method] |
john:OpenCL-BitLocker [2022/07/15 21:49] (current) solar [Step 3: Attack!] mention that there's no chance to find a fully lost Recovery Password |
||
---|---|---|---|
Line 69: | Line 69: | ||
As shown in the example, it returns 4 output hashes with different prefix: | As shown in the example, it returns 4 output hashes with different prefix: | ||
- | * If the device was encrypted using the User Password authentication methods, bitlocker2john prints those 2 hashes: | + | * If the device was encrypted using the User Password authentication method, bitlocker2john prints those 2 hashes: |
* $bitlocker$0$... : it starts the User Password fast attack mode (see [[#User Password authentication method|User Password Section]]) | * $bitlocker$0$... : it starts the User Password fast attack mode (see [[#User Password authentication method|User Password Section]]) | ||
* $bitlocker$1$... : it starts the User Password attack mode with MAC verification (slower execution, no false positives) | * $bitlocker$1$... : it starts the User Password attack mode with MAC verification (slower execution, no false positives) | ||
Line 94: | Line 94: | ||
-mask=?d?d?d?d?d?d[-]?d?d?d?d?d?d[-]?d?d?d?d?d?d[-]?d?d?d?d?d?d[-]?d?d?d?d?d?d[-]?d?d?d?d?d?d[-]?d?d?d?d?d?d[-]?d?d?d?d?d?d | -mask=?d?d?d?d?d?d[-]?d?d?d?d?d?d[-]?d?d?d?d?d?d[-]?d?d?d?d?d?d[-]?d?d?d?d?d?d[-]?d?d?d?d?d?d[-]?d?d?d?d?d?d[-]?d?d?d?d?d?d | ||
</code> | </code> | ||
+ | |||
+ | Please note that the number of possible Recovery Passwords is **way** too large, so there's effectively **no chance** that this will find yours unless you recall almost all of it (except for just a handful of digits) and replace most of the "?d" above with the known digits. | ||
Samples of User Password/Recovery Passwords dictionaries you can user are available here: https://github.com/e-ago/bitcracker/tree/master/Dictionary | Samples of User Password/Recovery Passwords dictionaries you can user are available here: https://github.com/e-ago/bitcracker/tree/master/Dictionary |