Linux - SoftwareThis forum is for Software issues.
Having a problem installing a new program? Want to know which application is best for the job? Post your question in this forum.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
I lost a password and want to try brute force. I have a vague idea of what the password was so I think it's worth a shot.
I need a word list generator, but not to generate words, to generate random strings (I don't know what that would be called).
I already have one that lets me specify maximum and minimum length and a list of characters that must be included (i.e. excluding all others). What I don't like about it is that it repeats characters too much, for example 11111112. I know I didn't use that so I need one that lets me put a limit on the repetition so as to reduce the number of entries.
I lost my LUKS key. How can I recover my data?
I forgot the passphrase to my LUKS-encrypted drive. What can I do?
How can I recover my data if forgot luks password ?
Resolution
This solution only works with LUKS1 devices. It is not possible to recover the master key of LUKS2 devices because the key is stored in the kernel directly.
Distribution: openSUSE, Raspbian, Slackware. Previous: MacOS, Red Hat, Coherent, Consensys SVR4.2, Tru64, Solaris
Posts: 2,818
Rep:
Quote:
Originally Posted by lucmove
Thanks, but that will not do. I need to find a random string (not any real words) with my own choice of allowed characters.
Is this a computer that you have administrative rights to? (What OS, BTW?)
If so (and it's Linux), why not just change it using the "root" account? Or boot from a rescue CD, mount the root filesystem, and fix it (if the account in question is the root account.)
If you don't have administrative rights, brute forcing entry into the system is going to raise some eyebrows (at the very least) or hackles (eventually) as there are undoubtedly logs of failed attempts and questions will inevitably be asked. Be aware that many systems apply administrative locks on accounts that have failed to successfully login after a given number of failed attempts in a row. (Note: accounts are also often "disusered" when the account has not been used in a given period of time, say, six months.) Then prostrating one's self before the Powers That Be will be necessary to get the password changed. Explaining 6 failures is easier than explaining 100,000.
Is this a computer that you have administrative rights to? (What OS, BTW?)
If so (and it's Linux), why not just change it using the "root" account? Or boot from a rescue CD, mount the root filesystem, and fix it (if the account in question is the root account.)
If you don't have administrative rights, brute forcing entry into the system is going to raise some eyebrows (at the very least) or hackles (eventually) as there are undoubtedly logs of failed attempts and questions will inevitably be asked. Be aware that many systems apply administrative locks on accounts that have failed to successfully login after a given number of failed attempts in a row. (Note: accounts are also often "disusered" when the account has not been used in a given period of time, say, six months.) Then prostrating one's self before the Powers That Be will be necessary to get the password changed. Explaining 6 failures is easier than explaining 100,000.
It is my personal computer, the one I've used at home for many years.
It's not a root password. It's a LUKS/dm-crypt password.
Check out this link: https://access.redhat.com/solutions/1543373
"This solution only works with LUKS1 devices. It is not possible to recover the master key of LUKS2 devices because the key is stored in the kernel directly."
From above link:
I find that very confusing. If the master key is stored in the kernel, what happens when the system is updated? What if it's an external media? I have googled that and couldn't find an explanation.
I find that very confusing. If the master key is stored in the kernel, what happens when the system is updated? What if it's an external media? I have googled that and couldn't find an explanation.
Good question but I don't claim to be an expert, nor I design the Kernel. But I believe there should be a signature that is kept on the OS to determine the uniqueness of the encryption or the media device, maybe it's like the logic of a MAC address that is unique to every NIC and it's kept on the NIC ROM. Just my 2 cents.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.