Differences

This shows you the differences between two versions of the page.

Link to this comparison view

john:OpenCL-BitLocker [2022/07/15 21:49]
solar [Step 3: Attack!] mention that there's no chance to find a fully lost Recovery Password
john:OpenCL-BitLocker [2024/11/09 04:35] (current)
solar [Step 3: Attack!] Sync with today's README.BitLocker update
Line 87: Line 87:
 </​code>​ </​code>​
  
-Currently, this format is able to evaluate passwords having length between 8 (minimum password length) and 55 characters (implementation reasons).  +Currently, this format is able to evaluate passwords having length between 8 (minimum password length) and 55 characters (implementation reasons).
-We will increase the max passwords size in the next release.+
  
-The mask you can use to generate Recovery ​Password ​is:+To avoid wasting compute resources, choose just one hash for this attack - either $bitlocker$0$... or $bitlocker$1$... 
 + 
 +===== Recovery Passwords (but you're out of luck cracking these, so just don't) ===== 
 + 
 +The mask you can use to generate Recovery ​Passwords ​is:
 <​code>​ <​code>​
--mask=?​d?​d?​d?​d?​d?​d[-]?​d?​d?​d?​d?​d?​d[-]?​d?​d?​d?​d?​d?​d[-]?​d?​d?​d?​d?​d?​d[-]?​d?​d?​d?​d?​d?​d[-]?​d?​d?​d?​d?​d?​d[-]?​d?​d?​d?​d?​d?​d[-]?​d?​d?​d?​d?​d?​d+--mask=?​d?​d?​d?​d?​d?​d-?​d?​d?​d?​d?​d?​d-?​d?​d?​d?​d?​d?​d-?​d?​d?​d?​d?​d?​d-?​d?​d?​d?​d?​d?​d-?​d?​d?​d?​d?​d?​d-?​d?​d?​d?​d?​d?​d-?​d?​d?​d?​d?​d?​d
 </​code>​ </​code>​
  
 Please note that the number of possible Recovery Passwords is **way** too large, so there'​s effectively **no chance** that this will find yours unless you recall almost all of it (except for just a handful of digits) and replace most of the "?​d"​ above with the known digits. Please note that the number of possible Recovery Passwords is **way** too large, so there'​s effectively **no chance** that this will find yours unless you recall almost all of it (except for just a handful of digits) and replace most of the "?​d"​ above with the known digits.
 +
 +Recovery Passwords are currently only supported by the BitLocker-OpenCL format (for use on GPUs), not by the corresponding BitLocker CPU format, but like the above paragraph says it's a controversial feature anyhow, which is unlikely to ever help.
 +
 +To avoid wasting compute resources, choose just one hash for this attack - either $bitlocker$2$... or $bitlocker$3$...
  
 Samples of User Password/​Recovery Passwords dictionaries you can user are available here: https://​github.com/​e-ago/​bitcracker/​tree/​master/​Dictionary Samples of User Password/​Recovery Passwords dictionaries you can user are available here: https://​github.com/​e-ago/​bitcracker/​tree/​master/​Dictionary
john/OpenCL-BitLocker.1657914580.txt · Last modified: 2022/07/15 21:49 by solar
 
Except where otherwise noted, content on this wiki is licensed under the following license: CC Attribution-Noncommercial-Share Alike 3.0 Unported
Recent changes RSS feed Donate to DokuWiki Powered by PHP Valid XHTML 1.0 Valid CSS Driven by DokuWiki Powered by OpenVZ Powered by Openwall GNU/*/Linux