xenial (1) bruteforce-luks.1.gz

Provided by: bruteforce-luks_1.1.1-2_amd64 bug

NAME

       bruteforce-luks - try to find the password of a LUKS volume

SYNOPSIS

       bruteforce-luks [options] <path to LUKS volume>

DESCRIPTION

       The  program  tries  to decrypt at least one of the key slots by trying all the possible passwords. It is
       especially useful if you know something about the password (i.e. you forgot a part of your  password  but
       still remember most of it). Finding the password of a volume without knowing anything about it would take
       way too much time (unless the password is really short and/or weak).

       There are command line options to specify:

              • the minimum password length to try

              • the maximum password length to try

              • the beginning of the password

              • the end of the password

              • the character set to use (among the characters of the current locale)

OPTIONS

       -b <string>
              Beginning of the password.
              Default: ""

       -e <string>
              End of the password.
              Default: ""

       -f <file>
              Read the passwords from a file instead of generating them.

       -h
              Show help and quit.

       -l <length>
              Minimum password length (beginning and end included).
              Default: 1

       -m <length>
              Maximum password length (beginning and end included).
              Default: 8

       -s <string>
              Password character set.
              Default: "0123456789ABCDEFGHIJKLMNOPQRSTU
                        VWXYZabcdefghijklmnopqrstuvwxyz"

       -t <n>
              Number of threads to use.
              Default: 1

       Sending a USR1 signal to a running bruteforce-luks process
       makes it print progress info to standard error and continue.

EXAMPLES

       Try to find the password of a LUKS encrypted volume  using  4  threads,  trying  only  passwords  with  5
       characters:

           bruteforce-luks -t 4 -l 5 -m 5 /dev/sdb1

       Try  to  find the password of a LUKS encrypted volume using 8 threads, trying only passwords with 5 to 10
       characters beginning with "W4l" and ending with "z":

           bruteforce-luks -t 8 -l 5 -m 10 -b "W4l" -e "z" /dev/sda2

       Try to find the password of a LUKS encrypted volume using  8  threads,  trying  only  passwords  with  10
       characters using the character set "P情8ŭ":

           bruteforce-luks -t 8 -l 10 -m 10 -s "P情8ŭ" /dev/sdc3

       Try  to find the password of a LUKS encrypted volume using 6 threads, trying the passwords contained in a
       dictionary file:

           bruteforce-luks -t 6 -f dictionary.txt /dev/sdd1

       Print progress info:

           pkill -USR1 -f bruteforce-luks