Re: Huge Problem with cryptoloop and AES: Lost Password

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Fri, 17 Nov 2006, Lars Reimann wrote:
ive a huge problem: i have mission critical data on a 400 GB raid 1. (2x400).

something you don't wanna hear right now, but still: "mission critical data" always has a backup (and no, RAID is not a backup).

lost, including passwords. However, i may remember certain details of the password, for example which characters I used not, and how the password ends.

How many characters do you know *for sure*? Even if there're still 10 unknown characters left and you're sure that you only uses alphanumeric characters, perhaps a few special characters, the already suggested brute-force attack might be worth (and interesting!) to try.

may have to write it on my own if nothing is available. I heard it may be possible to extract some sectors of ext2/3 partitions which are always

filesystems often (always?) have "magic numbers" on the beginning:

$ file -s /dev/sda2
/dev/sda2: Linux rev 1.0 ext2 filesystem data

If you're sure it's an ext2 filesystem, then just look/compare other ext2 filesystems. This magic number is documented in include/linux/magic.h (here: 0xef53)

# head -1 /dev/sda2 | od -x | grep ef53
0002060 443e 455e 0003 0021 ef53 0001 0002 0000

good luck,
Christian.
--
BOFH excuse #59:

failed trials, system needs redesigned

-
Linux-crypto:  cryptography in and on the Linux system
Archive:       http://mail.nl.linux.org/linux-crypto/


[Index of Archives]     [Kernel]     [Linux Crypto]     [Gnu Crypto]     [Gnu Classpath]     [Netfilter]     [Bugtraq]
  Powered by Linux