Using cores on multiple servers for bruteforce-luks
BACKGROUND:
I have already created a passphrase list to use with bruteforce-luks. Unfortunately, that list was not enough to find the correct passphrase. I am assuming I missed out a word or 2.
I am fairly sure some or all of the words are in the actual passphrase, but I am unsure of the remaining possible 1 to 3 words.
REVISED QUESTION:
I think between 1 to 3 words are missing. What's the best approach for me to use? I can't seem to remember what those words would be.
ORIGINAL QUESTION:
How would I go about attempting to use bruteforce-luks across 4 servers?
The servers are in a single building, and are currently loaded using a Linux Live Disk.
I have a usb stick which is luks encrypted and have forgotten the passphrase. Tried to bruteforce it at home, but my 2 core CPU was only giving me 4 passphrase attempts per second.
I'm hoping to make use of the 8 cores per server (32 cores in total) at the same time to attempt to speed up the bruteforce processing.
server encryption luks decryption
add a comment |
BACKGROUND:
I have already created a passphrase list to use with bruteforce-luks. Unfortunately, that list was not enough to find the correct passphrase. I am assuming I missed out a word or 2.
I am fairly sure some or all of the words are in the actual passphrase, but I am unsure of the remaining possible 1 to 3 words.
REVISED QUESTION:
I think between 1 to 3 words are missing. What's the best approach for me to use? I can't seem to remember what those words would be.
ORIGINAL QUESTION:
How would I go about attempting to use bruteforce-luks across 4 servers?
The servers are in a single building, and are currently loaded using a Linux Live Disk.
I have a usb stick which is luks encrypted and have forgotten the passphrase. Tried to bruteforce it at home, but my 2 core CPU was only giving me 4 passphrase attempts per second.
I'm hoping to make use of the 8 cores per server (32 cores in total) at the same time to attempt to speed up the bruteforce processing.
server encryption luks decryption
Do you know anything from that passphrase? If not, bruteforcing luks with strong passphrase is impossible and a waste of ressources. Even more if you want to use CPU and not GPU.
– RoVo
Jan 24 at 9:54
Yes, I have reduced the character set to about 32, with a minimal length of 10 characters. I did attempt a passphrase list file, but I guess I missed out a word or 2.
– oshirowanen
Jan 24 at 10:37
add a comment |
BACKGROUND:
I have already created a passphrase list to use with bruteforce-luks. Unfortunately, that list was not enough to find the correct passphrase. I am assuming I missed out a word or 2.
I am fairly sure some or all of the words are in the actual passphrase, but I am unsure of the remaining possible 1 to 3 words.
REVISED QUESTION:
I think between 1 to 3 words are missing. What's the best approach for me to use? I can't seem to remember what those words would be.
ORIGINAL QUESTION:
How would I go about attempting to use bruteforce-luks across 4 servers?
The servers are in a single building, and are currently loaded using a Linux Live Disk.
I have a usb stick which is luks encrypted and have forgotten the passphrase. Tried to bruteforce it at home, but my 2 core CPU was only giving me 4 passphrase attempts per second.
I'm hoping to make use of the 8 cores per server (32 cores in total) at the same time to attempt to speed up the bruteforce processing.
server encryption luks decryption
BACKGROUND:
I have already created a passphrase list to use with bruteforce-luks. Unfortunately, that list was not enough to find the correct passphrase. I am assuming I missed out a word or 2.
I am fairly sure some or all of the words are in the actual passphrase, but I am unsure of the remaining possible 1 to 3 words.
REVISED QUESTION:
I think between 1 to 3 words are missing. What's the best approach for me to use? I can't seem to remember what those words would be.
ORIGINAL QUESTION:
How would I go about attempting to use bruteforce-luks across 4 servers?
The servers are in a single building, and are currently loaded using a Linux Live Disk.
I have a usb stick which is luks encrypted and have forgotten the passphrase. Tried to bruteforce it at home, but my 2 core CPU was only giving me 4 passphrase attempts per second.
I'm hoping to make use of the 8 cores per server (32 cores in total) at the same time to attempt to speed up the bruteforce processing.
server encryption luks decryption
server encryption luks decryption
edited Jan 25 at 12:45
oshirowanen
asked Jan 24 at 9:44
oshirowanenoshirowanen
1,265185991
1,265185991
Do you know anything from that passphrase? If not, bruteforcing luks with strong passphrase is impossible and a waste of ressources. Even more if you want to use CPU and not GPU.
– RoVo
Jan 24 at 9:54
Yes, I have reduced the character set to about 32, with a minimal length of 10 characters. I did attempt a passphrase list file, but I guess I missed out a word or 2.
– oshirowanen
Jan 24 at 10:37
add a comment |
Do you know anything from that passphrase? If not, bruteforcing luks with strong passphrase is impossible and a waste of ressources. Even more if you want to use CPU and not GPU.
– RoVo
Jan 24 at 9:54
Yes, I have reduced the character set to about 32, with a minimal length of 10 characters. I did attempt a passphrase list file, but I guess I missed out a word or 2.
– oshirowanen
Jan 24 at 10:37
Do you know anything from that passphrase? If not, bruteforcing luks with strong passphrase is impossible and a waste of ressources. Even more if you want to use CPU and not GPU.
– RoVo
Jan 24 at 9:54
Do you know anything from that passphrase? If not, bruteforcing luks with strong passphrase is impossible and a waste of ressources. Even more if you want to use CPU and not GPU.
– RoVo
Jan 24 at 9:54
Yes, I have reduced the character set to about 32, with a minimal length of 10 characters. I did attempt a passphrase list file, but I guess I missed out a word or 2.
– oshirowanen
Jan 24 at 10:37
Yes, I have reduced the character set to about 32, with a minimal length of 10 characters. I did attempt a passphrase list file, but I guess I missed out a word or 2.
– oshirowanen
Jan 24 at 10:37
add a comment |
1 Answer
1
active
oldest
votes
Solution:
Create program which allows you to type in all the words you usually use in passwords.
Run the program which will do a sort of permutation but not only change the order of the words, but also build up the number of words used per permutation.
Save the generated passphrase text file (ended up being over 5,000,000 passphrases)
Use the 32 cores I had available and split the passphrase text file into 4. I file per server.
Use dd to create an additional 3 copies of the USB stick which needs to be brute-forced
Plug 1 USB stick into each of the 4 server, and 1 forth of the text file per server.
Install and run bruteforce-luks with all cores and all server and around 24 hours later, the passphrase was found.
add a comment |
Your Answer
StackExchange.ready(function() {
var channelOptions = {
tags: "".split(" "),
id: "89"
};
initTagRenderer("".split(" "), "".split(" "), channelOptions);
StackExchange.using("externalEditor", function() {
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled) {
StackExchange.using("snippets", function() {
createEditor();
});
}
else {
createEditor();
}
});
function createEditor() {
StackExchange.prepareEditor({
heartbeatType: 'answer',
autoActivateHeartbeat: false,
convertImagesToLinks: true,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: 10,
bindNavPrevention: true,
postfix: "",
imageUploader: {
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
},
onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
});
}
});
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2faskubuntu.com%2fquestions%2f1112450%2fusing-cores-on-multiple-servers-for-bruteforce-luks%23new-answer', 'question_page');
}
);
Post as a guest
Required, but never shown
1 Answer
1
active
oldest
votes
1 Answer
1
active
oldest
votes
active
oldest
votes
active
oldest
votes
Solution:
Create program which allows you to type in all the words you usually use in passwords.
Run the program which will do a sort of permutation but not only change the order of the words, but also build up the number of words used per permutation.
Save the generated passphrase text file (ended up being over 5,000,000 passphrases)
Use the 32 cores I had available and split the passphrase text file into 4. I file per server.
Use dd to create an additional 3 copies of the USB stick which needs to be brute-forced
Plug 1 USB stick into each of the 4 server, and 1 forth of the text file per server.
Install and run bruteforce-luks with all cores and all server and around 24 hours later, the passphrase was found.
add a comment |
Solution:
Create program which allows you to type in all the words you usually use in passwords.
Run the program which will do a sort of permutation but not only change the order of the words, but also build up the number of words used per permutation.
Save the generated passphrase text file (ended up being over 5,000,000 passphrases)
Use the 32 cores I had available and split the passphrase text file into 4. I file per server.
Use dd to create an additional 3 copies of the USB stick which needs to be brute-forced
Plug 1 USB stick into each of the 4 server, and 1 forth of the text file per server.
Install and run bruteforce-luks with all cores and all server and around 24 hours later, the passphrase was found.
add a comment |
Solution:
Create program which allows you to type in all the words you usually use in passwords.
Run the program which will do a sort of permutation but not only change the order of the words, but also build up the number of words used per permutation.
Save the generated passphrase text file (ended up being over 5,000,000 passphrases)
Use the 32 cores I had available and split the passphrase text file into 4. I file per server.
Use dd to create an additional 3 copies of the USB stick which needs to be brute-forced
Plug 1 USB stick into each of the 4 server, and 1 forth of the text file per server.
Install and run bruteforce-luks with all cores and all server and around 24 hours later, the passphrase was found.
Solution:
Create program which allows you to type in all the words you usually use in passwords.
Run the program which will do a sort of permutation but not only change the order of the words, but also build up the number of words used per permutation.
Save the generated passphrase text file (ended up being over 5,000,000 passphrases)
Use the 32 cores I had available and split the passphrase text file into 4. I file per server.
Use dd to create an additional 3 copies of the USB stick which needs to be brute-forced
Plug 1 USB stick into each of the 4 server, and 1 forth of the text file per server.
Install and run bruteforce-luks with all cores and all server and around 24 hours later, the passphrase was found.
answered Jan 25 at 23:09
oshirowanenoshirowanen
1,265185991
1,265185991
add a comment |
add a comment |
Thanks for contributing an answer to Ask Ubuntu!
- Please be sure to answer the question. Provide details and share your research!
But avoid …
- Asking for help, clarification, or responding to other answers.
- Making statements based on opinion; back them up with references or personal experience.
To learn more, see our tips on writing great answers.
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2faskubuntu.com%2fquestions%2f1112450%2fusing-cores-on-multiple-servers-for-bruteforce-luks%23new-answer', 'question_page');
}
);
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Do you know anything from that passphrase? If not, bruteforcing luks with strong passphrase is impossible and a waste of ressources. Even more if you want to use CPU and not GPU.
– RoVo
Jan 24 at 9:54
Yes, I have reduced the character set to about 32, with a minimal length of 10 characters. I did attempt a passphrase list file, but I guess I missed out a word or 2.
– oshirowanen
Jan 24 at 10:37