On Fri, 17 Nov 2006, Lars Reimann wrote:
ive a huge problem: i have mission critical data on a 400 GB raid 1. (2x400).
something you don't wanna hear right now, but still: "mission critical
data" always has a backup (and no, RAID is not a backup).
lost, including passwords. However, i may remember certain details of the
password, for example which characters I used not, and how the password ends.
How many characters do you know *for sure*? Even if there're still 10
unknown characters left and you're sure that you only uses alphanumeric
characters, perhaps a few special characters, the already suggested
brute-force attack might be worth (and interesting!) to try.
may have to write it on my own if nothing is available. I heard it may be
possible to extract some sectors of ext2/3 partitions which are always
filesystems often (always?) have "magic numbers" on the beginning:
$ file -s /dev/sda2
/dev/sda2: Linux rev 1.0 ext2 filesystem data
If you're sure it's an ext2 filesystem, then just look/compare other
ext2 filesystems. This magic number is documented in
include/linux/magic.h (here: 0xef53)
# head -1 /dev/sda2 | od -x | grep ef53
0002060 443e 455e 0003 0021 ef53 0001 0002 0000
good luck,
Christian.
--
BOFH excuse #59:
failed trials, system needs redesigned
-
Linux-crypto: cryptography in and on the Linux system
Archive: http://mail.nl.linux.org/linux-crypto/