Provided by: bruteforce-luks_1.1.1-2_amd64
bruteforce-luks - try to find the password of a LUKS volume
bruteforce-luks [options] <path to LUKS volume>
The program tries to decrypt at least one of the key slots by trying all the possible passwords. It is especially useful if you know something about the password (i.e. you forgot a part of your password but still remember most of it). Finding the password of a volume without knowing anything about it would take way too much time (unless the password is really short and/or weak). There are command line options to specify: · the minimum password length to try · the maximum password length to try · the beginning of the password · the end of the password · the character set to use (among the characters of the current locale)
-b <string> Beginning of the password. Default: "" -e <string> End of the password. Default: "" -f <file> Read the passwords from a file instead of generating them. -h Show help and quit. -l <length> Minimum password length (beginning and end included). Default: 1 -m <length> Maximum password length (beginning and end included). Default: 8 -s <string> Password character set. Default: "0123456789ABCDEFGHIJKLMNOPQRSTU VWXYZabcdefghijklmnopqrstuvwxyz" -t <n> Number of threads to use. Default: 1 Sending a USR1 signal to a running bruteforce-luks process makes it print progress info to standard error and continue.
Try to find the password of a LUKS encrypted volume using 4 threads, trying only passwords with 5 characters: bruteforce-luks -t 4 -l 5 -m 5 /dev/sdb1 Try to find the password of a LUKS encrypted volume using 8 threads, trying only passwords with 5 to 10 characters beginning with "W4l" and ending with "z": bruteforce-luks -t 8 -l 5 -m 10 -b "W4l" -e "z" /dev/sda2 Try to find the password of a LUKS encrypted volume using 8 threads, trying only passwords with 10 characters using the character set "P情8ŭ": bruteforce-luks -t 8 -l 10 -m 10 -s "P情8ŭ" /dev/sdc3 Try to find the password of a LUKS encrypted volume using 6 threads, trying the passwords contained in a dictionary file: bruteforce-luks -t 6 -f dictionary.txt /dev/sdd1 Print progress info: pkill -USR1 -f bruteforce-luks