Using cores on multiple servers for bruteforce-luks












0















BACKGROUND:



I have already created a passphrase list to use with bruteforce-luks. Unfortunately, that list was not enough to find the correct passphrase. I am assuming I missed out a word or 2.



I am fairly sure some or all of the words are in the actual passphrase, but I am unsure of the remaining possible 1 to 3 words.





REVISED QUESTION:



I think between 1 to 3 words are missing. What's the best approach for me to use? I can't seem to remember what those words would be.





ORIGINAL QUESTION:



How would I go about attempting to use bruteforce-luks across 4 servers?



The servers are in a single building, and are currently loaded using a Linux Live Disk.



I have a usb stick which is luks encrypted and have forgotten the passphrase. Tried to bruteforce it at home, but my 2 core CPU was only giving me 4 passphrase attempts per second.



I'm hoping to make use of the 8 cores per server (32 cores in total) at the same time to attempt to speed up the bruteforce processing.










share|improve this question

























  • Do you know anything from that passphrase? If not, bruteforcing luks with strong passphrase is impossible and a waste of ressources. Even more if you want to use CPU and not GPU.

    – RoVo
    Jan 24 at 9:54













  • Yes, I have reduced the character set to about 32, with a minimal length of 10 characters. I did attempt a passphrase list file, but I guess I missed out a word or 2.

    – oshirowanen
    Jan 24 at 10:37
















0















BACKGROUND:



I have already created a passphrase list to use with bruteforce-luks. Unfortunately, that list was not enough to find the correct passphrase. I am assuming I missed out a word or 2.



I am fairly sure some or all of the words are in the actual passphrase, but I am unsure of the remaining possible 1 to 3 words.





REVISED QUESTION:



I think between 1 to 3 words are missing. What's the best approach for me to use? I can't seem to remember what those words would be.





ORIGINAL QUESTION:



How would I go about attempting to use bruteforce-luks across 4 servers?



The servers are in a single building, and are currently loaded using a Linux Live Disk.



I have a usb stick which is luks encrypted and have forgotten the passphrase. Tried to bruteforce it at home, but my 2 core CPU was only giving me 4 passphrase attempts per second.



I'm hoping to make use of the 8 cores per server (32 cores in total) at the same time to attempt to speed up the bruteforce processing.










share|improve this question

























  • Do you know anything from that passphrase? If not, bruteforcing luks with strong passphrase is impossible and a waste of ressources. Even more if you want to use CPU and not GPU.

    – RoVo
    Jan 24 at 9:54













  • Yes, I have reduced the character set to about 32, with a minimal length of 10 characters. I did attempt a passphrase list file, but I guess I missed out a word or 2.

    – oshirowanen
    Jan 24 at 10:37














0












0








0








BACKGROUND:



I have already created a passphrase list to use with bruteforce-luks. Unfortunately, that list was not enough to find the correct passphrase. I am assuming I missed out a word or 2.



I am fairly sure some or all of the words are in the actual passphrase, but I am unsure of the remaining possible 1 to 3 words.





REVISED QUESTION:



I think between 1 to 3 words are missing. What's the best approach for me to use? I can't seem to remember what those words would be.





ORIGINAL QUESTION:



How would I go about attempting to use bruteforce-luks across 4 servers?



The servers are in a single building, and are currently loaded using a Linux Live Disk.



I have a usb stick which is luks encrypted and have forgotten the passphrase. Tried to bruteforce it at home, but my 2 core CPU was only giving me 4 passphrase attempts per second.



I'm hoping to make use of the 8 cores per server (32 cores in total) at the same time to attempt to speed up the bruteforce processing.










share|improve this question
















BACKGROUND:



I have already created a passphrase list to use with bruteforce-luks. Unfortunately, that list was not enough to find the correct passphrase. I am assuming I missed out a word or 2.



I am fairly sure some or all of the words are in the actual passphrase, but I am unsure of the remaining possible 1 to 3 words.





REVISED QUESTION:



I think between 1 to 3 words are missing. What's the best approach for me to use? I can't seem to remember what those words would be.





ORIGINAL QUESTION:



How would I go about attempting to use bruteforce-luks across 4 servers?



The servers are in a single building, and are currently loaded using a Linux Live Disk.



I have a usb stick which is luks encrypted and have forgotten the passphrase. Tried to bruteforce it at home, but my 2 core CPU was only giving me 4 passphrase attempts per second.



I'm hoping to make use of the 8 cores per server (32 cores in total) at the same time to attempt to speed up the bruteforce processing.







server encryption luks decryption






share|improve this question















share|improve this question













share|improve this question




share|improve this question








edited Jan 25 at 12:45







oshirowanen

















asked Jan 24 at 9:44









oshirowanenoshirowanen

1,265185991




1,265185991













  • Do you know anything from that passphrase? If not, bruteforcing luks with strong passphrase is impossible and a waste of ressources. Even more if you want to use CPU and not GPU.

    – RoVo
    Jan 24 at 9:54













  • Yes, I have reduced the character set to about 32, with a minimal length of 10 characters. I did attempt a passphrase list file, but I guess I missed out a word or 2.

    – oshirowanen
    Jan 24 at 10:37



















  • Do you know anything from that passphrase? If not, bruteforcing luks with strong passphrase is impossible and a waste of ressources. Even more if you want to use CPU and not GPU.

    – RoVo
    Jan 24 at 9:54













  • Yes, I have reduced the character set to about 32, with a minimal length of 10 characters. I did attempt a passphrase list file, but I guess I missed out a word or 2.

    – oshirowanen
    Jan 24 at 10:37

















Do you know anything from that passphrase? If not, bruteforcing luks with strong passphrase is impossible and a waste of ressources. Even more if you want to use CPU and not GPU.

– RoVo
Jan 24 at 9:54







Do you know anything from that passphrase? If not, bruteforcing luks with strong passphrase is impossible and a waste of ressources. Even more if you want to use CPU and not GPU.

– RoVo
Jan 24 at 9:54















Yes, I have reduced the character set to about 32, with a minimal length of 10 characters. I did attempt a passphrase list file, but I guess I missed out a word or 2.

– oshirowanen
Jan 24 at 10:37





Yes, I have reduced the character set to about 32, with a minimal length of 10 characters. I did attempt a passphrase list file, but I guess I missed out a word or 2.

– oshirowanen
Jan 24 at 10:37










1 Answer
1






active

oldest

votes


















0














Solution:




  1. Create program which allows you to type in all the words you usually use in passwords.


  2. Run the program which will do a sort of permutation but not only change the order of the words, but also build up the number of words used per permutation.


  3. Save the generated passphrase text file (ended up being over 5,000,000 passphrases)


  4. Use the 32 cores I had available and split the passphrase text file into 4. I file per server.


  5. Use dd to create an additional 3 copies of the USB stick which needs to be brute-forced


  6. Plug 1 USB stick into each of the 4 server, and 1 forth of the text file per server.


  7. Install and run bruteforce-luks with all cores and all server and around 24 hours later, the passphrase was found.







share|improve this answer























    Your Answer








    StackExchange.ready(function() {
    var channelOptions = {
    tags: "".split(" "),
    id: "89"
    };
    initTagRenderer("".split(" "), "".split(" "), channelOptions);

    StackExchange.using("externalEditor", function() {
    // Have to fire editor after snippets, if snippets enabled
    if (StackExchange.settings.snippets.snippetsEnabled) {
    StackExchange.using("snippets", function() {
    createEditor();
    });
    }
    else {
    createEditor();
    }
    });

    function createEditor() {
    StackExchange.prepareEditor({
    heartbeatType: 'answer',
    autoActivateHeartbeat: false,
    convertImagesToLinks: true,
    noModals: true,
    showLowRepImageUploadWarning: true,
    reputationToPostImages: 10,
    bindNavPrevention: true,
    postfix: "",
    imageUploader: {
    brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
    contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
    allowUrls: true
    },
    onDemand: true,
    discardSelector: ".discard-answer"
    ,immediatelyShowMarkdownHelp:true
    });


    }
    });














    draft saved

    draft discarded


















    StackExchange.ready(
    function () {
    StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2faskubuntu.com%2fquestions%2f1112450%2fusing-cores-on-multiple-servers-for-bruteforce-luks%23new-answer', 'question_page');
    }
    );

    Post as a guest















    Required, but never shown

























    1 Answer
    1






    active

    oldest

    votes








    1 Answer
    1






    active

    oldest

    votes









    active

    oldest

    votes






    active

    oldest

    votes









    0














    Solution:




    1. Create program which allows you to type in all the words you usually use in passwords.


    2. Run the program which will do a sort of permutation but not only change the order of the words, but also build up the number of words used per permutation.


    3. Save the generated passphrase text file (ended up being over 5,000,000 passphrases)


    4. Use the 32 cores I had available and split the passphrase text file into 4. I file per server.


    5. Use dd to create an additional 3 copies of the USB stick which needs to be brute-forced


    6. Plug 1 USB stick into each of the 4 server, and 1 forth of the text file per server.


    7. Install and run bruteforce-luks with all cores and all server and around 24 hours later, the passphrase was found.







    share|improve this answer




























      0














      Solution:




      1. Create program which allows you to type in all the words you usually use in passwords.


      2. Run the program which will do a sort of permutation but not only change the order of the words, but also build up the number of words used per permutation.


      3. Save the generated passphrase text file (ended up being over 5,000,000 passphrases)


      4. Use the 32 cores I had available and split the passphrase text file into 4. I file per server.


      5. Use dd to create an additional 3 copies of the USB stick which needs to be brute-forced


      6. Plug 1 USB stick into each of the 4 server, and 1 forth of the text file per server.


      7. Install and run bruteforce-luks with all cores and all server and around 24 hours later, the passphrase was found.







      share|improve this answer


























        0












        0








        0







        Solution:




        1. Create program which allows you to type in all the words you usually use in passwords.


        2. Run the program which will do a sort of permutation but not only change the order of the words, but also build up the number of words used per permutation.


        3. Save the generated passphrase text file (ended up being over 5,000,000 passphrases)


        4. Use the 32 cores I had available and split the passphrase text file into 4. I file per server.


        5. Use dd to create an additional 3 copies of the USB stick which needs to be brute-forced


        6. Plug 1 USB stick into each of the 4 server, and 1 forth of the text file per server.


        7. Install and run bruteforce-luks with all cores and all server and around 24 hours later, the passphrase was found.







        share|improve this answer













        Solution:




        1. Create program which allows you to type in all the words you usually use in passwords.


        2. Run the program which will do a sort of permutation but not only change the order of the words, but also build up the number of words used per permutation.


        3. Save the generated passphrase text file (ended up being over 5,000,000 passphrases)


        4. Use the 32 cores I had available and split the passphrase text file into 4. I file per server.


        5. Use dd to create an additional 3 copies of the USB stick which needs to be brute-forced


        6. Plug 1 USB stick into each of the 4 server, and 1 forth of the text file per server.


        7. Install and run bruteforce-luks with all cores and all server and around 24 hours later, the passphrase was found.








        share|improve this answer












        share|improve this answer



        share|improve this answer










        answered Jan 25 at 23:09









        oshirowanenoshirowanen

        1,265185991




        1,265185991






























            draft saved

            draft discarded




















































            Thanks for contributing an answer to Ask Ubuntu!


            • Please be sure to answer the question. Provide details and share your research!

            But avoid



            • Asking for help, clarification, or responding to other answers.

            • Making statements based on opinion; back them up with references or personal experience.


            To learn more, see our tips on writing great answers.




            draft saved


            draft discarded














            StackExchange.ready(
            function () {
            StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2faskubuntu.com%2fquestions%2f1112450%2fusing-cores-on-multiple-servers-for-bruteforce-luks%23new-answer', 'question_page');
            }
            );

            Post as a guest















            Required, but never shown





















































            Required, but never shown














            Required, but never shown












            Required, but never shown







            Required, but never shown

































            Required, but never shown














            Required, but never shown












            Required, but never shown







            Required, but never shown







            Popular posts from this blog

            How to reconfigure Docker Trusted Registry 2.x.x to use CEPH FS mount instead of NFS and other traditional...

            is 'sed' thread safe

            How to make a Squid Proxy server?