
luks-volume-cracker
Application and Source
An application for performing a dictionary attack on encrypted volumes. Basically a wrapper around FreeOTFE, which also supports Linux volumes (Cryptoloop, dm-crypt, LUKS).
By design these encrpytion systems are very slow to brute force, so a dictionary based attack is only appropriate for poorly chosen passphrases.
Benefits
- Check if your passphrase is secure
How it works
- Count the initial number of drives in the system
- Loop through the input in the dictionary
- Execute a command line statement to mount the encrypted image using the current passphrase (/mount /volume volume /password password /silent N:\)
- If it’s a Linux drive, use the WinAPI to automatically fill in the GUI prompt
- When the number of drives has changed a volume has been mounted, so one of the recently tried passwords was used
About
Uses the excellent FreeOTFE by SDean http://www.freeotfe.org/
Created by Christopher Doman (http://www.christopherdoman.com) for the DC3 Forensics Challenge 2012 (http://www.dc3.mil/challenge/2012). Created on quite a short schedule, so please consider this beta software and inform me of any bugs.
Project Information
The project was created on Nov 2, 2012.
- License: Apache License 2.0
- svn-based source control
Labels:
luks
encryption
cracking
password
passphrase
dm-crypt
freeotfe
Cryptography