On Sunday, November 19, 2017 11:15:01 AM UTC [email protected] wrote: > I have bitcoin in a vm wallet. So it turns into a very costly issue.
Depending on how much time and money you're willing to invest, how long and complicated the password is, and how much of the password you remember, you might be able bruteforce your way in. Qubes uses LUKS to encrypt the disk: https://en.wikipedia.org/wiki/Linux_Unified_Key_Setup There is a number of LUKS bruteforcing tools you might try and resources you might dive into: https://github.com/glv2/bruteforce-luks http://irq5.io/2014/11/19/bruteforcing-luks-volumes-explained/ https://www.hacker10.com/other-computing/brute-force-linux-encryption-with-luks-volume-cracker/ Note the second link -- it talks about LUKS headers, which is the only thing you need to copy off of your drive to start bruteforcing on other machines. Don't try bruteforcing on your laptop, it will take forever. Instead, get the LUKS header off of it, get some solid CPU power somewhere and use that. When I needed to recover a lost LUKS password (it was a 6-word diceware passphrase, 4 words and the first letter of the 5th I remembered), it took me ~30h of bruteforcing on some 20 cores to get it. Good luck! -- Pozdrawiam, Michał "rysiek" Woźniak Zmieniam klucz GPG :: http://rys.io/pl/147 GPG Key Transition :: http://rys.io/en/147 -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. To post to this group, send email to [email protected]. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/2206727.TezqhYYeyA%40qubuntu. For more options, visit https://groups.google.com/d/optout.
signature.asc
Description: This is a digitally signed message part.
