Cracking linux full disc encryption, luks with hashcat.
Luks (linux unified key system), and dm-crypt are the standard that linux, and many others use for doing whole disk encryption. When implemented correctly, #it can be nearly impossible to brute force. However when using a poor password or a shared password, it can fail horribly.For this example we will create our own luks container using the standard process, and a terrible password. Then we will extract the header and using open source hashcat, crack the password quickly and easily. There is a fantastic write up on how luks works below, if the nuts and bolts of the process are important to you.Bruteforcing LUKS Volumes ExplainedTLDR, just give me the commands!▻https://medium.com/media/d6df41ac7d8260e59dcffbcd3f914750/hrefThe way that luks handles the master key and the encrypted data (...)