|
|
Message-ID: <5e28b6ee-4f83-3a3c-0f38-7793b504443d@gmail.com>
Date: Sun, 26 Aug 2018 19:43:08 +0200
From: CRO <enigmista1980@...il.com>
To: john-users@...ts.openwall.com
Subject: Re: Filevault2 volume without password
Thanks magnum.
> On 2018-08-26 10:54, George Still wrote:
>> I'm trying to mount a disk image encrypted volume in my forensic case.
>> I don't know the password, so I can't extract hash from the raw image.
>
> You typically extract some data from the (unmounted) partition or file
> that holds the encrypted image and then run dmg2john on that, producing
> a "hash".
How? I extracted EncryptedRoot.plist.wipekey following the Wiki
https://github.com/libyal/libfvde/wiki/Mounting
You can also run dmg2john et. al. directly against the image
> file or partition. In this case you already have an image file so you
> should just run something like:
>
> $ cd path/to/john/run
> $ ./dmg2john /path/to/your/image.file > image_hash
> $ ./john -format:dmg-opencl image_hash (...)
I have not a .dmg image. I have a raw image:
# mmls image.raw
GUID Partition Table (EFI)
Offset Sector: 0
Units are in 512-byte sectors
Slot Start End Length Description
000: Meta 0000000000 0000000000 0000000001 Safety Table
001: ------- 0000000000 0000000039 0000000040 Unallocated
002: Meta 0000000001 0000000001 0000000001 GPT Header
003: Meta 0000000002 0000000033 0000000032 Partition Table
004: 000 0000000040 0000409639 0000409600 EFI System Partition
005: 001 0000409640 0488965175 0488555536 No title
006: 002 0488965176 0490234711 0001269536 Recovery HD
007: ------- 0490234712 0490234751 0000000040 Unallocated
dmg2john works with .dmg files
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.