找回密码
 注册

QQ登录

只需一步,快速开始


使用方法
Use the build.sh script to build 3 executables:
  • bitcracker_hash
  • bitcracker_cuda
  • bitcracker_opencl
The script stores the executables in the build local directory. You need to configure the src_CUDA/Makefile and src_OpenCL/Makefile according to your CUDA/GPU/Platform type or version.
Step 1: 提取镜像

sudo dd if=/dev/disk2 of=/path/to/imageEncrypted conv=noerror,sync
4030464+0 records in
4030464+0 records out
2063597568 bytes transferred in 292.749849 secs (7049013 bytes/sec)

Step 2: 提取hash
/build/bitcracker_hash -o test_hash -i ./Images/imgWin7

---------> BitCracker Hash Extractor <---------
Opening file ./Images/imgWin7

....

Signature found at 0x02208000
Version: 2 (Windows 7 or later)

VMK entry found at 0x022080bc
VMK encrypted with user password found!
VMK encrypted with AES-CCM

VMK entry found at 0x0220819c
VMK encrypted with Recovery key found!
VMK encrypted with AES-CCM

User Password hash:
$bitlocker$0$16$89a5bad722db4a729d3c7b9ee8e76a29$1048576$12$304a4ac192a2cf0103000000$60$24de9a6128e8f8ffb97ac72d21de40f63dbc44acf101e68ac0f7e52ecb1be4a8ee30ca1e69fbe98400707ba3977d5f09b14e388c885f312edc5c85c2

Recovery Key hash:
$bitlocker$2$16$8b7be4f7802275ffbdad3766c7f7fa4a$1048576$12$304a4ac192a2cf0106000000$60$6e72f6ef6ba688e72211b8cf8cc722affd308882965dc195f85614846f5eb7d9037d4d63bcc1d6e904f0030cf2e3a95b3e1067447b089b7467f86688

Output file for user password attack: "hash_user_pass.txt"
Output file for recovery password attack: "hash_recv_pass.txt"
Step 3: 开始破解
./build/bitcracker_cuda -f ./test_hash/hash_user_pass.txt -d ./Dictionary/user_passwords.txt -t 1 -b 1 -g 0 -u

====================================
Selected device: GPU Tesla K80 (ID: 0)
====================================
....
Reading hash file "./test_hash/hash_user_pass.txt"
$bitlocker$0$16$0a8b9d0655d3900e9f67280adc27b5d7$1048576$12$b0599ad6c6a1cf0103000000$60$c16658f54140b3d90be6de9e03b1fe90033a2c7df7127bcd16cb013cf778c12072142c484c9c291a496fc0ebd8c21c33b595a9c1587acfc6d8bb9663

====================================
Attack
====================================

Type of attack: User Password
CUDA Threads: 1024
CUDA Blocks: 1
Psw per thread: 1
Max Psw per kernel: 1024
Dictionary: ./Dictionary/user_passwords.txt
Strict Check (-s): No
MAC Comparison (-m): No

CUDA Kernel execution:
        Stream 0
        Effective number psw: 12
        Passwords Range:
                abcdefshhf
                .....
                blablalbalbalbla12
        Time: 28.651947 sec
        Passwords x second:     0.42 pw/sec

================================================
....
Password found: paperino
================================================
我知道答案 本帖寻求最佳答案回答被采纳后将获得系统奖励10 金币 , 目前已有0人回答

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?注册

x
分享至 : QQ空间
收藏
有没有参加CTF比赛的,一起组队啊!

0 个回复

您需要登录后才可以回帖 登录 | 注册
关闭

站长推荐 上一条 /1 下一条