Results 1 to 3 of 3

Thread: Forgot passphrase of persistent knoppix-data.aes but know possible passwords!

  1. #1
    Junior Member
    Join Date
    Jul 2015
    Posts
    2

    Exclamation Forgot passphrase of persistent knoppix-data.aes but know possible passwords!

    Hello good people



    I used to use a usb bootable Knoppix 7.0 with an encrypted knoppix-data.aes for online banking, bitcoin wallet and private docs and passwords, I tried logging in again after over a year but its not the passphrase I thought it was.


    I urgently need to verify the password as there is a time limit to do with the issue another issue at hand (I can explain whats going on in a subsequent reply, but I wont lengthen my first post here).

    The passphrase is a combination of shorter passwords I have used in the past and I know 100% the first password. I have successfully generated a dictionary text file with 600 combinations of the passphrase but I don't know how to proceed in trying them out automated, hashcat?


    If I was to use hashcat I would need the password hash? I've searched but I don't have any idea how to obtain the hash from knoppix-data.aes


    I feel pretty silly I thought I knew the password and now time is ticking, I'd really appreciate any advice, thanks.

  2. #2
    Junior Member
    Join Date
    Jul 2015
    Posts
    2
    update: I've been speaking to a couple of helpful people on irc and it was suggested I type I
    while read pass; do echo "$pass" | losetup -p 0 -e aes -k 256 /dev/loop2 knoppix-data.aes && echo $pass worked && break; done < /your/password/file.txt
    I did this and got the terminal to return workedr78977897 78977897 is not the correct password though

  3. #3
    Member registered user
    Join Date
    Dec 2006
    Posts
    44
    here is a script that I use to check and repair the file system in a knoppix-data.aes :

    losetup /dev/loop7 /mnt-system/KNOPPIX/knoppix-data.aes
    cryptsetup --cipher aes --key-size 256 --hash ripemd160 create cryp2knop /dev/loop7
    fsck.ext4 -y -v /dev/mapper/cryp2knop
    sync
    cryptsetup remove cryp2knop
    losetup -d /dev/loop7

    maybe you can use the cryptsetup in a loop similar to yours to use the password file.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  


A-Tech 8GB DDR3 1600 PC3-12800 Laptop SODIMM 204-Pin Memory RAM PC3L DDR3L 1x 8G picture

A-Tech 8GB DDR3 1600 PC3-12800 Laptop SODIMM 204-Pin Memory RAM PC3L DDR3L 1x 8G

$13.99



Team T-FORCE VULCAN Z 16GB (2 x 8GB) 288-Pin PC RAM DDR4 3200 (PC4 25600) XMP picture

Team T-FORCE VULCAN Z 16GB (2 x 8GB) 288-Pin PC RAM DDR4 3200 (PC4 25600) XMP

$35.99



HyperX FURY DDR3 8GB 16GB 32GB 1600 MHz PC3-12800 Desktop RAM Memory DIMM 240pin picture

HyperX FURY DDR3 8GB 16GB 32GB 1600 MHz PC3-12800 Desktop RAM Memory DIMM 240pin

$12.90



Crucial DDR3L 16GB 1600 2x 8GB PC3-12800 Laptop SODIMM Memory RAM PC3 16G DDR3 picture

Crucial DDR3L 16GB 1600 2x 8GB PC3-12800 Laptop SODIMM Memory RAM PC3 16G DDR3

$21.50



Crucial 16GB (2x 8GB) Kit DDR3L 1600MHz PC3-12800 UDIMM Desktop 240-Pin CL11 RAM picture

Crucial 16GB (2x 8GB) Kit DDR3L 1600MHz PC3-12800 UDIMM Desktop 240-Pin CL11 RAM

$23.33



LOT OF OWC 16GB DDR4 PC4-21300 2666MHz 2Rx8 ECC Unbuffered DIMM MEMORY RAM picture

LOT OF OWC 16GB DDR4 PC4-21300 2666MHz 2Rx8 ECC Unbuffered DIMM MEMORY RAM

$2300.00



LOT OF OWC 32GB DDR4 PC4-21300 2666MHz 2Rx8 Non-ECC DIMM MEMORY RAM picture

LOT OF OWC 32GB DDR4 PC4-21300 2666MHz 2Rx8 Non-ECC DIMM MEMORY RAM

$3000.00



HyperX FURY DDR4 16GB 32GB 64GB 2666MHz PC4-21300 Desktop RAM Memory DIMM 288Pin picture

HyperX FURY DDR4 16GB 32GB 64GB 2666MHz PC4-21300 Desktop RAM Memory DIMM 288Pin

$119.80



HyperX FURY DDR4 64GB (4x16GB) 3200MHz PC4-25600 Desktop RAM Memory DIMM 288PIN picture

HyperX FURY DDR4 64GB (4x16GB) 3200MHz PC4-25600 Desktop RAM Memory DIMM 288PIN

$129.95