Question

I have 16 servers that have been out of operation for over a year and removed from there rack, all of the servers used full disk encryption (cryptsetup). I have a list of keys, all of which are a minimum of 48 bits using every character on the UK keyboard.

The problem I have is that I don't know which key is for which server and due to the key length and the 3 tries and then reboot policy it is taking a VERY long time to figure out which key unlocks which server as all the labels which named the server have since been removed.

Is it possible to dump the hash off each server and then perform an offline attack against the hash using the list of keys I have. This would save me a lot of time and effort and seems like a much easier way of performing the operation.

Was it helpful?

Solution

If you can remove the disks and add them to another system, you can LUKS mount the disks without rebooting, and thereby get as many tries as you want.

Licensed under: CC-BY-SA with attribution
Not affiliated with StackOverflow
scroll top