I have 16 servers that have been out of operation for over a year and removed from there rack, all of the servers used full disk encryption (cryptsetup). I have a list of keys, all of which are a minimum of 48 bits using every character on the UK keyboard.

The problem I have is that I don't know which key is for which server and due to the key length and the 3 tries and then reboot policy it is taking a VERY long time to figure out which key unlocks which server as all the labels which named the server have since been removed.

Is it possible to dump the hash off each server and then perform an offline attack against the hash using the list of keys I have. This would save me a lot of time and effort and seems like a much easier way of performing the operation.

有帮助吗?

解决方案

If you can remove the disks and add them to another system, you can LUKS mount the disks without rebooting, and thereby get as many tries as you want.

许可以下: CC-BY-SA归因
不隶属于 StackOverflow
scroll top