bruteforce-luks
bruteforce-luks attempts to discover passwords for LUKS encrypted volumes by trying all possible combinations. It is particularly useful when partial password knowledge is available, such as in forensics scenarios.
Description
The program is used to try discovery a password for encrypted LUKS volume used to security reasons. It works trying decrypt at least one of the key slots by trying all the possible passwords. It is used in forensics and is especially useful if you know something about the password (i.e. you forgot a part of your password but still remember most of it).
Because of cryptography complexity, crack the password of a LUKS volume without knowing anything about it would take way too much time (unless the password is really short and/or weak).
Sending a USR1 signal to a running bruteforce-luks process makes it print progress info to standard error and continue.
How It Works
bruteforce-luks generates and tests possible passwords against a LUKS encrypted volume, attempting to decrypt at least one key slot. It supports specifying password beginnings, ends, lengths, or reading from files, systematically brute-forcing combinations based on provided constraints. Progress can be monitored via USR1 signal to stderr.
Installation
sudo apt install bruteforce-luksFlags
Examples
bruteforce-luks --helpbruteforce-luks /path/to/luks_volumebruteforce-luks -b 'pass' /path/to/luks_volumebruteforce-luks -e '123' /path/to/luks_volumebruteforce-luks -f passwords.txt /path/to/luks_volumebruteforce-luks -l 8 /path/to/luks_volumekill -USR1 <pid>