On Sunday, November 19, 2017 11:15:01 AM UTC
tbenne...@gmail.com wrote:
> I have bitcoin in a vm wallet. So it turns into a very costly issue.
Depending on how much time and money you're willing to invest, how long and
complicated the password is, and how much of the password you remember, you
might be able bruteforce your way in.
Qubes uses LUKS to encrypt the disk:
https://en.wikipedia.org/wiki/Linux_Unified_Key_Setup
There is a number of LUKS bruteforcing tools you might try and resources you
might dive into:
https://github.com/glv2/bruteforce-luks
http://irq5.io/2014/11/19/bruteforcing-luks-volumes-explained/
https://www.hacker10.com/other-computing/brute-force-linux-encryption-with-luks-volume-cracker/
Note the second link -- it talks about LUKS headers, which is the only thing
you need to copy off of your drive to start bruteforcing on other machines.
Don't try bruteforcing on your laptop, it will take forever. Instead, get the
LUKS header off of it, get some solid CPU power somewhere and use that.
When I needed to recover a lost LUKS password (it was a 6-word diceware
passphrase, 4 words and the first letter of the 5th I remembered), it took me
~30h of bruteforcing on some 20 cores to get it.
Good luck!