Сейчас на форуме: rmn (+1 невидимый пользователь) |
eXeL@B —› WorldWide —› Drivecrypt HASHed password |
Посл.ответ | Сообщение |
|
Создано: 15 февраля 2007 00:50 · Личное сообщение · #1 Anyone here is interested on getting the hash password of a drivecrypt image? Currently I'm trying to find the hashed sha256 and sha1 password from a drivecrypt image so that the password could be tried in bruteforce and/or dictionary attack. I just got stucked up when drivecrypt calls a kernel side routine to verify the password. For now my solution is to research about how a driveimage works. |
|
Создано: 15 февраля 2007 02:00 · Поправил: theCollision · Личное сообщение · #2 |
|
Создано: 15 февраля 2007 03:38 · Личное сообщение · #3 |
|
Создано: 15 февраля 2007 04:16 · Личное сообщение · #4 |
|
Создано: 15 февраля 2007 05:33 · Личное сообщение · #5 |
|
Создано: 15 февраля 2007 14:10 · Личное сообщение · #6 Thank you for the reply theCollision and don't worry my english sucks Anyways Scratch is right about that. But I would a better chance of cracking the hash than cracking the whole image itself since it would be rjaendale, aes, rc6 but I know that the hash would be SHA1 or SHA256. The minimal password for drivecrypt would be 8 characters long and as long as 160 total password is possible. Bruteforcing it would not be easy but I could only try to make a distributed attacked (used lot's of computer to crack the hash). So far I already got an open source program that works like drivecrypt and hope to analyzed it's kernel routines so I could somehow get to the routine of drivecrypt's driver. Drivecrypt have a header from offset 0 to 9984 (and it is always random for every new container). As I first thought that the hash would be there somewhere in the open but unfortunately drivecrypt encoded it. Also I have read rumors that it is possible that drivecrypt implemented a pgp like routine that uses a masterpassword in order to mount images. Another rumor is that the password could be overriden. So I just need to confirm those rumors or just do it the old fashion bruteforcing way. So I just need to findout where to get and decode the hashkey. |
|
Создано: 17 апреля 2007 02:49 · Личное сообщение · #7 |
|
Создано: 17 апреля 2007 10:46 · Личное сообщение · #8 Once I was on hard work with "DriveCrypt": trying to reanimate some crashed DriveCrypt's encrypted disk. It wasn't the same studing as yours, but I hope it'd help you. I used to use next installer: dc_setup_302b.exe, size 937 324 bytes. 05f1_17.04.2007_CRACKLAB.rU.tgz - dcr.txt ----- The one derivative you manage is the one I abhore (c) Slipknot |
eXeL@B —› WorldWide —› Drivecrypt HASHed password |