How To Hack Bitlocker Password In Windows 10
BitLocker is a full-disk encryption characteristic available in recent Windows versions (Vista, 7, 8.1 and ten) Pro and Enterprise. BitCracker is a mono-GPU password cracking tool for memory units encrypted with the countersign authentication mode of BitLocker (run into picture below).
Our set on has been tested on several memory units encrypted with BitLocker running on Windows 7, Window 8.ane and Windows 10 (both compatible and non-compatible mode). Here we present 2 implementations: CUDA and OpenCL.
Requirements
For CUDA implementation, you need at least CUDA vii.v and an NVIDIA GPU with minimum cc3.five (i.e. Kepler arch)
How To
Use the build.sh script to build 3 executables:
- hash extractor
- BitCracker CUDA version
- BitCracker OpenCL version
The executables are stored in the build directory.
Earlier starting the attack, yous demand to run bitcracker_hash to extract the hash from the encrypted memory unit.
> ./build/bitcracker_hash -h Usage: ./build/bitcracker_hash -i <Encrypted retentiveness unit> -o <output file>
Options:
-h, --assist Show this help
-i, --image Path of memory unit encrypted with BitLocker
-o, --outfile Output file
The extracted hash is fully uniform with the John The Ripper format (see next Department).
So you lot can utilise the output hash file to run the BitCracker assail.
> ./build/bitcracker_cuda -h Usage: ./build/bitcracker_cuda -f <hash_file> -d <dictionary_file>
Options:
-h, --help Prove this help
-f, --hashfile Path to your input hash file (HashExtractor output)
-s, --strict Strict cheque (use but in example of false positives)
-d, --dictionary Path to dictionary or alphabet file
-g, --gpu GPU device number
-t, --passthread Set the number of password per thread threads
-b, --blocks Set the number of blocks
Notation: In case of false positives you can use the -s pick, that is a more restrictive cheque on the correctness of the terminal upshot. Altough this bank check is empirically verified and information technology works with the images of this repo encrypted with Windows seven, 8.1 and 10, we tin't guarantee that information technology doesn't lead to faux negatives. Use -s option only if BitCracker returns several simulated positives.
In the the run_test.sh script there are several assail examples using the encrypted images provided in this repo:
- imgWin7: memory unit encrypted with BitLocker using Windows vii Enteprise edition Os
- imgWin8: retention unit encrypted with BitLocker using Windows 8 Enteprise edition Os
- imgWin10Compatible.vhd: memory unit encrypted with BitLocker (uniform mode) using Windows 10 Enteprise edition OS,
- imgWin10NonCompatible.vhd: retention unit encrypted with BitLocker (Not compatible manner) using Windows 10 Enteprise edition OS,
- imgWin10CompatibleLong27.vhd: memory unit encrypted with BitLocker (compatible manner) using Windows 10 Enteprise edition OS using the longest possible countersign (27 characters)
Currently, BitCracker is able to evaluate passwords having length between viii (minimum password length) and 27 characters (implementation reasons).
BitCracker doesn't provide whatsoever mask attack, cache machinery or smart dictionary creation; therefore you need to provide your ain input dictionary.
Operation
Here we report best performance of BitCracker implementations tested on unlike GPUs
GPU Acronim | GPU | Arch | CC | # SM | Clock | CUDA |
---|---|---|---|---|---|---|
GFT | GeForce Titan | Kepler | three.5 | 14 | 835 | 7.0 |
GTK80 | Tesla K80 | Kepler | 3.five | xiii | 875 | seven.five |
GFTX | GeForce Titan X | Maxwell | 5.two | 24 | 1001 | 7.5 |
GTP100 | Telsa P100 | Pascal | 6.i | 56 | 1328 | 8.0 |
AMDM | Radedon Malta | - | - | - | - | - |
Performance:
Version | GPU | -t | -b | Passwords ten kernel | Passwords/sec | Hash/sec |
---|---|---|---|---|---|---|
CUDA | GFT | 8 | xiii | 106.496 | 303 | 635 MH/s |
CUDA | GTK80 | viii | 14 | 114.688 | 370 | 775 MH/south |
CUDA | GFTX | 8 | 24 | 106.608 | 933 | 1.957 MH/s |
CUDA | GTP100 | 8 | 56 | 458.752 | 1.363 | 2.858 MH/s |
OpenCL | AMDM | 32 | 64 | 524.288 | 241 | 505 MH/s |
OpenCL | GFTX | 8 | 24 | 196.608 | 884 | 1.853 MH/s |
John The Ripper
We released the OpenCL version as a plugin of the John The Ripper (bleeding jumbo) suite:
- Wiki page: http://openwall.info/wiki/john/OpenCL-BitLocker
- JtR source code: https://github.com/magnumripper/JohnTheRipper
Adjacent Release
In the next relese:
- The maximum countersign lenght will be dynamic
- Amend strict bank check with optional MAC verification to avoid any faux positive
Source: https://www.hacking.land/2017/10/bitcracker-bitlocker-password-cracking.html
Posted by: khanhingall.blogspot.com
0 Response to "How To Hack Bitlocker Password In Windows 10"
Post a Comment