recover forgotten password for sparse image
I created a encrypted sparse image a couple of years ago. I have since forgotten the password. How do I recover the password?
(OS X 10.10.5)
Thanks.
I created a encrypted sparse image a couple of years ago. I have since forgotten the password. How do I recover the password?
(OS X 10.10.5)
Thanks.
UserFromCupertino wrote:
The internets tell me if you get the password hash out of some file, you should be able to run a password hacker on it. Where would I find this password hash?
Thanks
There's no "hash out of some file" here. That's fodder for TV shows and fiction and poorly-written crypto, but — short of a completely revolutionary cryptographic attack — that's just not something found with peer-reviewed and secure modern cryptography.
If the password has been forgotten, then somebody will have to brute-force the encrypted disk, and — with a good password having been chosen — that might take a few decades. Not kidding about that time horizon, either. Might take quite a lot longer than decades, too.
With AES — which is what is used with most OS X disk images — there are no known viable attacks. There is only brute-forcing. And that effort might require — and I'm not making this up — billions of years for a good password, with present-day technology.
If things were otherwise, the encryption would not be considered very secure.
UserFromCupertino wrote:
The internets tell me if you get the password hash out of some file, you should be able to run a password hacker on it. Where would I find this password hash?
Thanks
There's no "hash out of some file" here. That's fodder for TV shows and fiction and poorly-written crypto, but — short of a completely revolutionary cryptographic attack — that's just not something found with peer-reviewed and secure modern cryptography.
If the password has been forgotten, then somebody will have to brute-force the encrypted disk, and — with a good password having been chosen — that might take a few decades. Not kidding about that time horizon, either. Might take quite a lot longer than decades, too.
With AES — which is what is used with most OS X disk images — there are no known viable attacks. There is only brute-forcing. And that effort might require — and I'm not making this up — billions of years for a good password, with present-day technology.
If things were otherwise, the encryption would not be considered very secure.
You can't recover it. If you forgot it, then whatever is on the encrypted image is lost.
If you kind of remember your style of making up passwords, you might be able to speed up the password attack. There are professional recovery firms you could employ ...
There are tools that will do a dictionary crack, but you'll only have luck if you used a weak password.
LMGTFY: http://bfy.tw/11Io
I use a few word combinations and uppercase/lowercase to create my passwords. I want to be able to feed a password cracker this info and have it try all combinations. Is there such a tool available?
The internets tell me if you get the password hash out of some file, you should be able to run a password hacker on it. Where would I find this password hash?
Thanks
I have no idea. Try a Google search.
recover forgotten password for sparse image