ID KITPLOIT:2008041285543762824 Type kitploit Reporter KitPloit Modified 2017-10-01T14:35:05
Description
BitLocker is a full-disk encryption feature available in recent Windows versions (Vista, 7, 8.1 and 10) Pro and Enterprise. BitCracker is a mono-GPU password cracking tool for memory units encrypted with the password authentication mode of BitLocker (see picture below).
Our attack has been tested on several memory units encrypted with BitLocker running on Windows 7, Window 8.1 and Windows 10 (both compatible and non-compatible mode). Here we present two implementations: CUDA and OpenCL.
Requirements
For CUDA implementation, you need at least CUDA 7.5 and an NVIDIA GPU with minimum cc3.5 (i.e. Kepler arch)
How To
Use the build.sh script to build 3 executables:
hash extractor
BitCracker CUDA version
BitCracker OpenCL version
The executables are stored in the build directory.
Before starting the attack, you need to run bitcracker_hash to extract the hash from the encrypted memory unit.
-h, --help Show this help
-i, --image Path of memory unit encrypted with BitLocker
-o, --outfile Output file
The extracted hash is fully compatible with the John The Ripper format (see next Section).
Then you can use the output hash file to run the BitCracker attack.
> ./build/bitcracker_cuda -h
Usage: ./build/bitcracker_cuda -f <hash_file> -d <dictionary_file>
Options:
-h, --help Show this help
-f, --hashfile Path to your input hash file (HashExtractor output)
-s, --strict Strict check (use only in case of false positives)
-d, --dictionary Path to dictionary or alphabet file
-g, --gpu GPU device number
-t, --passthread Set the number of password per thread threads
-b, --blocks Set the number of blocks
Note: In case of false positives you can use the -s option, that is a more restrictive check on the correctness of the final result. Altough this check is empirically verified and it works with the images of this repo encrypted with Windows 7, 8.1 and 10, we can't guarantee that it doesn't lead to false negatives. Use -s option only if BitCracker returns several false positives.
In the the run_test.sh script there are several attack examples using the encrypted images provided in this repo:
imgWin7: memory unit encrypted with BitLocker using Windows 7 Enteprise edition OS
imgWin8: memory unit encrypted with BitLocker using Windows 8 Enteprise edition OS
imgWin10Compatible.vhd: memory unit encrypted with BitLocker (compatible mode) using Windows 10 Enteprise edition OS,
imgWin10NonCompatible.vhd: memory unit encrypted with BitLocker (NON compatible mode) using Windows 10 Enteprise edition OS,
imgWin10CompatibleLong27.vhd: memory unit encrypted with BitLocker (compatible mode) using Windows 10 Enteprise edition OS using the longest possible password (27 characters)
Currently, BitCracker is able to evaluate passwords having length between 8 (minimum password length) and 27 characters (implementation reasons).
BitCracker doesn't provide any mask attack, cache mechanism or smart dictionary creation; therefore you need to provide your own input dictionary.
{"id": "KITPLOIT:2008041285543762824", "bulletinFamily": "tools", "title": "BitCracker - BitLocker Password Cracking Tool (Windows Encryption Tool)", "description": "[  ](<https://2.bp.blogspot.com/-858TKLclqqs/Wch0FrbGz6I/AAAAAAAAI-A/Jl2ImBZRDL0OmD-4zFyGQuhvNkw-QFbHgCLcBGAs/s1600/BitLocker.png>)\n\n \nBitLocker is a full-disk encryption feature available in recent [ Windows ](<https://www.kitploit.com/search/label/Windows>) versions (Vista, 7, 8.1 and 10) Pro and Enterprise. BitCracker is a mono-GPU password [ cracking ](<https://www.kitploit.com/search/label/Cracking>) tool for memory units encrypted with the password authentication mode of BitLocker (see picture below). \n \n\n\n[  ](<https://3.bp.blogspot.com/-hBZjhXDhxok/Wch0WkUuXXI/AAAAAAAAI-E/agiQjixNsq0uIUNXo7OSnIRqK5qbwpaUwCLcBGAs/s1600/BitLocker_.png>)\n\n \n \nOur attack has been tested on several memory units encrypted with BitLocker running on [ Windows ](<https://www.kitploit.com/search/label/Windows>) 7, Window 8.1 and Windows 10 (both compatible and non-compatible mode). Here we present two implementations: CUDA and OpenCL. \n \n \n** Requirements ** \nFor CUDA implementation, you need at least CUDA 7.5 and an NVIDIA GPU with minimum cc3.5 (i.e. Kepler arch) \n \n** How To ** \nUse the build.sh script to build 3 executables: \n\n\n * hash extractor \n * BitCracker CUDA version \n * BitCracker OpenCL version \nThe executables are stored in the build directory. \nBefore starting the attack, you need to run bitcracker_hash to extract the hash from the encrypted memory unit. \n\n \n \n > ./build/bitcracker_hash -h\n \n Usage: ./build/bitcracker_hash -i <Encrypted memory unit> -o <output file>\n \n Options:\n \n -h, --help Show this help\n -i, --image Path of memory unit encrypted with BitLocker\n -o, --outfile Output file\n\nThe extracted hash is fully compatible with the John The Ripper format (see next Section). \nThen you can use the output hash file to run the BitCracker attack. \n\n \n \n > ./build/bitcracker_cuda -h\n \n Usage: ./build/bitcracker_cuda -f <hash_file> -d <dictionary_file>\n \n Options:\n \n -h, --help Show this help\n -f, --hashfile Path to your input hash file (HashExtractor output)\n -s, --strict Strict check (use only in case of false positives)\n -d, --dictionary Path to dictionary or alphabet file\n -g, --gpu GPU device number\n -t, --passthread Set the number of password per thread threads\n -b, --blocks Set the number of blocks\n\nNote: In case of false positives you can use the -s option, that is a more restrictive check on the correctness of the final result. Altough this check is empirically verified and it works with the images of this repo encrypted with Windows 7, 8.1 and 10, we can't guarantee that it doesn't lead to false negatives. Use -s option only if BitCracker returns several false positives. \nIn the the run_test.sh script there are several attack examples using the encrypted images provided in this repo: \n\n\n * imgWin7: memory unit encrypted with BitLocker using Windows 7 Enteprise edition OS \n * imgWin8: memory unit encrypted with BitLocker using Windows 8 Enteprise edition OS \n * imgWin10Compatible.vhd: memory unit encrypted with BitLocker (compatible mode) using Windows 10 Enteprise edition OS, \n * imgWin10NonCompatible.vhd: memory unit encrypted with BitLocker (NON compatible mode) using Windows 10 Enteprise edition OS, \n * imgWin10CompatibleLong27.vhd: memory unit encrypted with BitLocker (compatible mode) using Windows 10 Enteprise edition OS using the longest possible password (27 characters) \nCurrently, BitCracker is able to evaluate passwords having length between 8 (minimum password length) and 27 characters (implementation reasons). \nBitCracker doesn't provide any mask attack, cache mechanism or smart dictionary creation; therefore you need to provide your own input dictionary. \n \n** Performance ** \nHere we report best performance of BitCracker implementations tested on different GPUs \nGPU Acronim | GPU | Arch | CC | # SM | Clock | CUDA \n---|---|---|---|---|---|--- \nGFT | GeForce Titan | Kepler | 3.5 | 14 | 835 | 7.0 \nGTK80 | Tesla K80 | Kepler | 3.5 | 13 | 875 | 7.5 \nGFTX | GeForce Titan X | Maxwell | 5.2 | 24 | 1001 | 7.5 \nGTP100 | Telsa P100 | Pascal | 6.1 | 56 | 1328 | 8.0 \nAMDM | Radedon Malta | \\- | \\- | \\- | \\- | \\- \nPerformance: \nVersion | GPU | -t | -b | Passwords x kernel | Passwords/sec | Hash/sec \n---|---|---|---|---|---|--- \nCUDA | GFT | 8 | 13 | 106.496 | 303 | 635 MH/s \nCUDA | GTK80 | 8 | 14 | 114.688 | 370 | 775 MH/s \nCUDA | GFTX | 8 | 24 | 106.608 | 933 | 1.957 MH/s \nCUDA | GTP100 | 8 | 56 | 458.752 | 1.363 | 2.858 MH/s \nOpenCL | AMDM | 32 | 64 | 524.288 | 241 | 505 MH/s \nOpenCL | GFTX | 8 | 24 | 196.608 | 884 | 1.853 MH/s \n \n** John The Ripper ** \nWe released the OpenCL version as a plugin of the John The Ripper (bleeding jumbo) suite: \n\n\n * Wiki page: [ http://openwall.info/wiki/john/OpenCL-BitLocker ](<http://openwall.info/wiki/john/OpenCL-BitLocker>)\n * JtR source code: [ https://github.com/magnumripper/JohnTheRipper ](<https://github.com/magnumripper/JohnTheRipper>)\n \n** Next Release ** \nIn the next relese: \n\n\n * The maximum password lenght will be dynamic \n * Improve strict check with optional MAC verification to avoid any false positive \n \n\n\n** [ Download BitCracker ](<https://github.com/e-ago/bitcracker>) **\n", "published": "2017-10-01T14:35:05", "modified": "2017-10-01T14:35:05", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "http://www.kitploit.com/2017/10/bitcracker-bitlocker-password-cracking.html", "reporter": "KitPloit", "references": ["https://github.com/e-ago/bitcracker", "https://github.com/magnumripper/JohnTheRipper"], "cvelist": [], "type": "kitploit", "lastseen": "2019-10-18T16:35:01", "history": [{"bulletin": {"bulletinFamily": "tools", "cvelist": [], "cvss": {"score": 0.0, "vector": "NONE"}, "description": "[  ](<https://2.bp.blogspot.com/-858TKLclqqs/Wch0FrbGz6I/AAAAAAAAI-A/Jl2ImBZRDL0OmD-4zFyGQuhvNkw-QFbHgCLcBGAs/s1600/BitLocker.png>)\n\n \nBitLocker is a full-disk encryption feature available in recent [ Windows ](<https://www.kitploit.com/search/label/Windows>) versions (Vista, 7, 8.1 and 10) Pro and Enterprise. BitCracker is a mono-GPU password [ cracking ](<https://www.kitploit.com/search/label/Cracking>) tool for memory units encrypted with the password authentication mode of BitLocker (see picture below). \n \n\n\n[  ](<https://3.bp.blogspot.com/-hBZjhXDhxok/Wch0WkUuXXI/AAAAAAAAI-E/agiQjixNsq0uIUNXo7OSnIRqK5qbwpaUwCLcBGAs/s1600/BitLocker_.png>)\n\n \n \nOur attack has been tested on several memory units encrypted with BitLocker running on [ Windows ](<https://www.kitploit.com/search/label/Windows>) 7, Window 8.1 and Windows 10 (both compatible and non-compatible mode). Here we present two implementations: CUDA and OpenCL. \n \n \n** Requirements ** \nFor CUDA implementation, you need at least CUDA 7.5 and an NVIDIA GPU with minimum cc3.5 (i.e. Kepler arch) \n \n** How To ** \nUse the build.sh script to build 3 executables: \n\n\n * hash extractor \n * BitCracker CUDA version \n * BitCracker OpenCL version \nThe executables are stored in the build directory. \nBefore starting the attack, you need to run bitcracker_hash to extract the hash from the encrypted memory unit. \n\n \n \n > ./build/bitcracker_hash -h\n \n Usage: ./build/bitcracker_hash -i <Encrypted memory unit> -o <output file>\n \n Options:\n \n -h, --help Show this help\n -i, --image Path of memory unit encrypted with BitLocker\n -o, --outfile Output file\n\nThe extracted hash is fully compatible with the John The Ripper format (see next Section). \nThen you can use the output hash file to run the BitCracker attack. \n\n \n \n > ./build/bitcracker_cuda -h\n \n Usage: ./build/bitcracker_cuda -f <hash_file> -d <dictionary_file>\n \n Options:\n \n -h, --help Show this help\n -f, --hashfile Path to your input hash file (HashExtractor output)\n -s, --strict Strict check (use only in case of false positives)\n -d, --dictionary Path to dictionary or alphabet file\n -g, --gpu GPU device number\n -t, --passthread Set the number of password per thread threads\n -b, --blocks Set the number of blocks\n\nNote: In case of false positives you can use the -s option, that is a more restrictive check on the correctness of the final result. Altough this check is empirically verified and it works with the images of this repo encrypted with Windows 7, 8.1 and 10, we can't guarantee that it doesn't lead to false negatives. Use -s option only if BitCracker returns several false positives. \nIn the the run_test.sh script there are several attack examples using the encrypted images provided in this repo: \n\n\n * imgWin7: memory unit encrypted with BitLocker using Windows 7 Enteprise edition OS \n * imgWin8: memory unit encrypted with BitLocker using Windows 8 Enteprise edition OS \n * imgWin10Compatible.vhd: memory unit encrypted with BitLocker (compatible mode) using Windows 10 Enteprise edition OS, \n * imgWin10NonCompatible.vhd: memory unit encrypted with BitLocker (NON compatible mode) using Windows 10 Enteprise edition OS, \n * imgWin10CompatibleLong27.vhd: memory unit encrypted with BitLocker (compatible mode) using Windows 10 Enteprise edition OS using the longest possible password (27 characters) \nCurrently, BitCracker is able to evaluate passwords having length between 8 (minimum password length) and 27 characters (implementation reasons). \nBitCracker doesn't provide any mask attack, cache mechanism or smart dictionary creation; therefore you need to provide your own input dictionary. \n \n** Performance ** \nHere we report best performance of BitCracker implementations tested on different GPUs \nGPU Acronim | GPU | Arch | CC | # SM | Clock | CUDA \n---|---|---|---|---|---|--- \nGFT | GeForce Titan | Kepler | 3.5 | 14 | 835 | 7.0 \nGTK80 | Tesla K80 | Kepler | 3.5 | 13 | 875 | 7.5 \nGFTX | GeForce Titan X | Maxwell | 5.2 | 24 | 1001 | 7.5 \nGTP100 | Telsa P100 | Pascal | 6.1 | 56 | 1328 | 8.0 \nAMDM | Radedon Malta | \\- | \\- | \\- | \\- | \\- \nPerformance: \nVersion | GPU | -t | -b | Passwords x kernel | Passwords/sec | Hash/sec \n---|---|---|---|---|---|--- \nCUDA | GFT | 8 | 13 | 106.496 | 303 | 635 MH/s \nCUDA | GTK80 | 8 | 14 | 114.688 | 370 | 775 MH/s \nCUDA | GFTX | 8 | 24 | 106.608 | 933 | 1.957 MH/s \nCUDA | GTP100 | 8 | 56 | 458.752 | 1.363 | 2.858 MH/s \nOpenCL | AMDM | 32 | 64 | 524.288 | 241 | 505 MH/s \nOpenCL | GFTX | 8 | 24 | 196.608 | 884 | 1.853 MH/s \n \n** John The Ripper ** \nWe released the OpenCL version as a plugin of the John The Ripper (bleeding jumbo) suite: \n\n\n * Wiki page: [ http://openwall.info/wiki/john/OpenCL-BitLocker ](<http://openwall.info/wiki/john/OpenCL-BitLocker>)\n * JtR source code: [ https://github.com/magnumripper/JohnTheRipper ](<https://github.com/magnumripper/JohnTheRipper>)\n \n** Next Release ** \nIn the next relese: \n\n\n * The maximum password lenght will be dynamic \n * Improve strict check with optional MAC verification to avoid any false positive \n \n\n\n** [ Download BitCracker ](<https://github.com/e-ago/bitcracker>) **\n", "edition": 9, "enchantments": {"score": {"modified": "2018-10-26T03:34:03", "value": 5.0, "vector": "NONE"}}, "hash": "3e029b5f138aa9d123f98b6137c9eea3c3f0961aa44ca4964c06c2ac009c744d", "hashmap": [{"hash": "0317b7a60189990b975c8110692dfbe5", "key": "description"}, {"hash": "8315c5eeaf200489bd3ebf95f66c4c29", "key": "references"}, {"hash": "250115f9731757eaace68a09026189ae", "key": "title"}, {"hash": "397e50eb4cab6109ef886f119bc559e9", "key": "modified"}, {"hash": "aba454e3574969396c0dddcb45011dcc", "key": "reporter"}, {"hash": "397e50eb4cab6109ef886f119bc559e9", "key": "published"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "cvelist"}, {"hash": "743ae8897e4dd823fe541b5751961b02", "key": "href"}, {"hash": "4a931512ce65bdc9ca6808adf92d8783", "key": "bulletinFamily"}, {"hash": "8cd4821cb504d25572038ed182587d85", "key": "cvss"}, {"hash": "4553be2119d862322dd6fec6bb385401", "key": "type"}, {"hash": "2741b1bee87e87f66213222b2c95936e", "key": "toolHref"}], "history": [], "href": "http://www.kitploit.com/2017/10/bitcracker-bitlocker-password-cracking.html", "id": "KITPLOIT:2008041285543762824", "lastseen": "2018-10-26T03:34:03", "modified": "2017-10-01T14:35:05", "objectVersion": "1.3", "published": "2017-10-01T14:35:05", "references": ["https://github.com/e-ago/bitcracker", "https://github.com/magnumripper/JohnTheRipper"], "reporter": "KitPloit", "title": "BitCracker - BitLocker Password Cracking Tool (Windows Encryption Tool)", "toolHref": "https://github.com/e-ago/bitcracker", "type": "kitploit", "viewCount": 0}, "differentElements": ["cvss", "cvelist"], "edition": 9, "lastseen": "2018-10-26T03:34:03"}, {"bulletin": {"bulletinFamily": "tools", "cvelist": [], "cvss": {"score": 0.0, "vector": "NONE"}, "description": "[  ](<https://2.bp.blogspot.com/-858TKLclqqs/Wch0FrbGz6I/AAAAAAAAI-A/Jl2ImBZRDL0OmD-4zFyGQuhvNkw-QFbHgCLcBGAs/s1600/BitLocker.png>)\n\n \nBitLocker is a full-disk encryption feature available in recent [ Windows ](<https://www.kitploit.com/search/label/Windows>) versions (Vista, 7, 8.1 and 10) Pro and Enterprise. BitCracker is a mono-GPU password [ cracking ](<https://www.kitploit.com/search/label/Cracking>) tool for memory units encrypted with the password authentication mode of BitLocker (see picture below). \n \n\n\n[  ](<https://3.bp.blogspot.com/-hBZjhXDhxok/Wch0WkUuXXI/AAAAAAAAI-E/agiQjixNsq0uIUNXo7OSnIRqK5qbwpaUwCLcBGAs/s1600/BitLocker_.png>)\n\n \n \nOur attack has been tested on several memory units encrypted with BitLocker running on [ Windows ](<https://www.kitploit.com/search/label/Windows>) 7, Window 8.1 and Windows 10 (both compatible and non-compatible mode). Here we present two implementations: CUDA and OpenCL. \n \n \n** Requirements ** \nFor CUDA implementation, you need at least CUDA 7.5 and an NVIDIA GPU with minimum cc3.5 (i.e. Kepler arch) \n \n** How To ** \nUse the build.sh script to build 3 executables: \n\n\n * hash extractor \n * BitCracker CUDA version \n * BitCracker OpenCL version \nThe executables are stored in the build directory. \nBefore starting the attack, you need to run bitcracker_hash to extract the hash from the encrypted memory unit. \n\n \n \n > ./build/bitcracker_hash -h\n \n Usage: ./build/bitcracker_hash -i <Encrypted memory unit> -o <output file>\n \n Options:\n \n -h, --help Show this help\n -i, --image Path of memory unit encrypted with BitLocker\n -o, --outfile Output file\n\nThe extracted hash is fully compatible with the John The Ripper format (see next Section). \nThen you can use the output hash file to run the BitCracker attack. \n\n \n \n > ./build/bitcracker_cuda -h\n \n Usage: ./build/bitcracker_cuda -f <hash_file> -d <dictionary_file>\n \n Options:\n \n -h, --help Show this help\n -f, --hashfile Path to your input hash file (HashExtractor output)\n -s, --strict Strict check (use only in case of false positives)\n -d, --dictionary Path to dictionary or alphabet file\n -g, --gpu GPU device number\n -t, --passthread Set the number of password per thread threads\n -b, --blocks Set the number of blocks\n\nNote: In case of false positives you can use the -s option, that is a more restrictive check on the correctness of the final result. Altough this check is empirically verified and it works with the images of this repo encrypted with Windows 7, 8.1 and 10, we can't guarantee that it doesn't lead to false negatives. Use -s option only if BitCracker returns several false positives. \nIn the the run_test.sh script there are several attack examples using the encrypted images provided in this repo: \n\n\n * imgWin7: memory unit encrypted with BitLocker using Windows 7 Enteprise edition OS \n * imgWin8: memory unit encrypted with BitLocker using Windows 8 Enteprise edition OS \n * imgWin10Compatible.vhd: memory unit encrypted with BitLocker (compatible mode) using Windows 10 Enteprise edition OS, \n * imgWin10NonCompatible.vhd: memory unit encrypted with BitLocker (NON compatible mode) using Windows 10 Enteprise edition OS, \n * imgWin10CompatibleLong27.vhd: memory unit encrypted with BitLocker (compatible mode) using Windows 10 Enteprise edition OS using the longest possible password (27 characters) \nCurrently, BitCracker is able to evaluate passwords having length between 8 (minimum password length) and 27 characters (implementation reasons). \nBitCracker doesn't provide any mask attack, cache mechanism or smart dictionary creation; therefore you need to provide your own input dictionary. \n \n** Performance ** \nHere we report best performance of BitCracker implementations tested on different GPUs \nGPU Acronim | GPU | Arch | CC | # SM | Clock | CUDA \n---|---|---|---|---|---|--- \nGFT | GeForce Titan | Kepler | 3.5 | 14 | 835 | 7.0 \nGTK80 | Tesla K80 | Kepler | 3.5 | 13 | 875 | 7.5 \nGFTX | GeForce Titan X | Maxwell | 5.2 | 24 | 1001 | 7.5 \nGTP100 | Telsa P100 | Pascal | 6.1 | 56 | 1328 | 8.0 \nAMDM | Radedon Malta | \\- | \\- | \\- | \\- | \\- \nPerformance: \nVersion | GPU | -t | -b | Passwords x kernel | Passwords/sec | Hash/sec \n---|---|---|---|---|---|--- \nCUDA | GFT | 8 | 13 | 106.496 | 303 | 635 MH/s \nCUDA | GTK80 | 8 | 14 | 114.688 | 370 | 775 MH/s \nCUDA | GFTX | 8 | 24 | 106.608 | 933 | 1.957 MH/s \nCUDA | GTP100 | 8 | 56 | 458.752 | 1.363 | 2.858 MH/s \nOpenCL | AMDM | 32 | 64 | 524.288 | 241 | 505 MH/s \nOpenCL | GFTX | 8 | 24 | 196.608 | 884 | 1.853 MH/s \n \n** John The Ripper ** \nWe released the OpenCL version as a plugin of the John The Ripper (bleeding jumbo) suite: \n\n\n * Wiki page: [ http://openwall.info/wiki/john/OpenCL-BitLocker ](<http://openwall.info/wiki/john/OpenCL-BitLocker>)\n * JtR source code: [ https://github.com/magnumripper/JohnTheRipper ](<https://github.com/magnumripper/JohnTheRipper>)\n \n** Next Release ** \nIn the next relese: \n\n\n * The maximum password lenght will be dynamic \n * Improve strict check with optional MAC verification to avoid any false positive \n \n\n\n** [ Download BitCracker ](<https://github.com/e-ago/bitcracker>) **\n", "edition": 17, "enchantments": {"dependencies": {"modified": "2019-10-18T06:33:33", "references": []}, "score": {"modified": "2019-10-18T06:33:33", "value": -0.0, "vector": "NONE"}}, "hash": "3e029b5f138aa9d123f98b6137c9eea3c3f0961aa44ca4964c06c2ac009c744d", "hashmap": [{"hash": "0317b7a60189990b975c8110692dfbe5", "key": "description"}, {"hash": "8315c5eeaf200489bd3ebf95f66c4c29", "key": "references"}, {"hash": "250115f9731757eaace68a09026189ae", "key": "title"}, {"hash": "397e50eb4cab6109ef886f119bc559e9", "key": "modified"}, {"hash": "aba454e3574969396c0dddcb45011dcc", "key": "reporter"}, {"hash": "397e50eb4cab6109ef886f119bc559e9", "key": "published"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "cvelist"}, {"hash": "743ae8897e4dd823fe541b5751961b02", "key": "href"}, {"hash": "4a931512ce65bdc9ca6808adf92d8783", "key": "bulletinFamily"}, {"hash": "8cd4821cb504d25572038ed182587d85", "key": "cvss"}, {"hash": "4553be2119d862322dd6fec6bb385401", "key": "type"}, {"hash": "2741b1bee87e87f66213222b2c95936e", "key": "toolHref"}], "history": [], "href": "http://www.kitploit.com/2017/10/bitcracker-bitlocker-password-cracking.html", "id": "KITPLOIT:2008041285543762824", "lastseen": "2019-10-18T06:33:33", "modified": "2017-10-01T14:35:05", "objectVersion": "1.3", "published": "2017-10-01T14:35:05", "references": ["https://github.com/e-ago/bitcracker", "https://github.com/magnumripper/JohnTheRipper"], "reporter": "KitPloit", "title": "BitCracker - BitLocker Password Cracking Tool (Windows Encryption Tool)", "toolHref": "https://github.com/e-ago/bitcracker", "type": "kitploit", "viewCount": 14}, "differentElements": ["cvss", "cvelist"], "edition": 17, "lastseen": "2019-10-18T06:33:33"}, {"bulletin": {"bulletinFamily": "tools", "cvelist": ["CVE-2018-10933"], "cvss": {"score": 6.4, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:NONE/"}, "description": "[  ](<https://2.bp.blogspot.com/-858TKLclqqs/Wch0FrbGz6I/AAAAAAAAI-A/Jl2ImBZRDL0OmD-4zFyGQuhvNkw-QFbHgCLcBGAs/s1600/BitLocker.png>)\n\n \nBitLocker is a full-disk encryption feature available in recent [ Windows ](<https://www.kitploit.com/search/label/Windows>) versions (Vista, 7, 8.1 and 10) Pro and Enterprise. BitCracker is a mono-GPU password [ cracking ](<https://www.kitploit.com/search/label/Cracking>) tool for memory units encrypted with the password authentication mode of BitLocker (see picture below). \n \n\n\n[  ](<https://3.bp.blogspot.com/-hBZjhXDhxok/Wch0WkUuXXI/AAAAAAAAI-E/agiQjixNsq0uIUNXo7OSnIRqK5qbwpaUwCLcBGAs/s1600/BitLocker_.png>)\n\n \n \nOur attack has been tested on several memory units encrypted with BitLocker running on [ Windows ](<https://www.kitploit.com/search/label/Windows>) 7, Window 8.1 and Windows 10 (both compatible and non-compatible mode). Here we present two implementations: CUDA and OpenCL. \n \n \n** Requirements ** \nFor CUDA implementation, you need at least CUDA 7.5 and an NVIDIA GPU with minimum cc3.5 (i.e. Kepler arch) \n \n** How To ** \nUse the build.sh script to build 3 executables: \n\n\n * hash extractor \n * BitCracker CUDA version \n * BitCracker OpenCL version \nThe executables are stored in the build directory. \nBefore starting the attack, you need to run bitcracker_hash to extract the hash from the encrypted memory unit. \n\n \n \n > ./build/bitcracker_hash -h\n \n Usage: ./build/bitcracker_hash -i <Encrypted memory unit> -o <output file>\n \n Options:\n \n -h, --help Show this help\n -i, --image Path of memory unit encrypted with BitLocker\n -o, --outfile Output file\n\nThe extracted hash is fully compatible with the John The Ripper format (see next Section). \nThen you can use the output hash file to run the BitCracker attack. \n\n \n \n > ./build/bitcracker_cuda -h\n \n Usage: ./build/bitcracker_cuda -f <hash_file> -d <dictionary_file>\n \n Options:\n \n -h, --help Show this help\n -f, --hashfile Path to your input hash file (HashExtractor output)\n -s, --strict Strict check (use only in case of false positives)\n -d, --dictionary Path to dictionary or alphabet file\n -g, --gpu GPU device number\n -t, --passthread Set the number of password per thread threads\n -b, --blocks Set the number of blocks\n\nNote: In case of false positives you can use the -s option, that is a more restrictive check on the correctness of the final result. Altough this check is empirically verified and it works with the images of this repo encrypted with Windows 7, 8.1 and 10, we can't guarantee that it doesn't lead to false negatives. Use -s option only if BitCracker returns several false positives. \nIn the the run_test.sh script there are several attack examples using the encrypted images provided in this repo: \n\n\n * imgWin7: memory unit encrypted with BitLocker using Windows 7 Enteprise edition OS \n * imgWin8: memory unit encrypted with BitLocker using Windows 8 Enteprise edition OS \n * imgWin10Compatible.vhd: memory unit encrypted with BitLocker (compatible mode) using Windows 10 Enteprise edition OS, \n * imgWin10NonCompatible.vhd: memory unit encrypted with BitLocker (NON compatible mode) using Windows 10 Enteprise edition OS, \n * imgWin10CompatibleLong27.vhd: memory unit encrypted with BitLocker (compatible mode) using Windows 10 Enteprise edition OS using the longest possible password (27 characters) \nCurrently, BitCracker is able to evaluate passwords having length between 8 (minimum password length) and 27 characters (implementation reasons). \nBitCracker doesn't provide any mask attack, cache mechanism or smart dictionary creation; therefore you need to provide your own input dictionary. \n \n** Performance ** \nHere we report best performance of BitCracker implementations tested on different GPUs \nGPU Acronim | GPU | Arch | CC | # SM | Clock | CUDA \n---|---|---|---|---|---|--- \nGFT | GeForce Titan | Kepler | 3.5 | 14 | 835 | 7.0 \nGTK80 | Tesla K80 | Kepler | 3.5 | 13 | 875 | 7.5 \nGFTX | GeForce Titan X | Maxwell | 5.2 | 24 | 1001 | 7.5 \nGTP100 | Telsa P100 | Pascal | 6.1 | 56 | 1328 | 8.0 \nAMDM | Radedon Malta | \\- | \\- | \\- | \\- | \\- \nPerformance: \nVersion | GPU | -t | -b | Passwords x kernel | Passwords/sec | Hash/sec \n---|---|---|---|---|---|--- \nCUDA | GFT | 8 | 13 | 106.496 | 303 | 635 MH/s \nCUDA | GTK80 | 8 | 14 | 114.688 | 370 | 775 MH/s \nCUDA | GFTX | 8 | 24 | 106.608 | 933 | 1.957 MH/s \nCUDA | GTP100 | 8 | 56 | 458.752 | 1.363 | 2.858 MH/s \nOpenCL | AMDM | 32 | 64 | 524.288 | 241 | 505 MH/s \nOpenCL | GFTX | 8 | 24 | 196.608 | 884 | 1.853 MH/s \n \n** John The Ripper ** \nWe released the OpenCL version as a plugin of the John The Ripper (bleeding jumbo) suite: \n\n\n * Wiki page: [ http://openwall.info/wiki/john/OpenCL-BitLocker ](<http://openwall.info/wiki/john/OpenCL-BitLocker>)\n * JtR source code: [ https://github.com/magnumripper/JohnTheRipper ](<https://github.com/magnumripper/JohnTheRipper>)\n \n** Next Release ** \nIn the next relese: \n\n\n * The maximum password lenght will be dynamic \n * Improve strict check with optional MAC verification to avoid any false positive \n \n\n\n** [ Download BitCracker ](<https://github.com/e-ago/bitcracker>) **\n", "edition": 6, "enchantments": {"score": {"modified": "2018-10-23T07:26:17", "value": 5.0, "vector": "NONE"}}, "hash": "9fb5dd7c822eb81a1b333f96bcc36b1d80089e779571466ba42fe5f75a62ff53", "hashmap": [{"hash": "0317b7a60189990b975c8110692dfbe5", "key": "description"}, {"hash": "8315c5eeaf200489bd3ebf95f66c4c29", "key": "references"}, {"hash": "250115f9731757eaace68a09026189ae", "key": "title"}, {"hash": "74ae407306a397b0a0ad358180716883", "key": "cvss"}, {"hash": "397e50eb4cab6109ef886f119bc559e9", "key": "modified"}, {"hash": "aba454e3574969396c0dddcb45011dcc", "key": "reporter"}, {"hash": "397e50eb4cab6109ef886f119bc559e9", "key": "published"}, {"hash": "743ae8897e4dd823fe541b5751961b02", "key": "href"}, {"hash": "4a931512ce65bdc9ca6808adf92d8783", "key": "bulletinFamily"}, {"hash": "4553be2119d862322dd6fec6bb385401", "key": "type"}, {"hash": "17be3096147bd1bcf829a9879cbe6f7d", "key": "cvelist"}, {"hash": "2741b1bee87e87f66213222b2c95936e", "key": "toolHref"}], "history": [], "href": "http://www.kitploit.com/2017/10/bitcracker-bitlocker-password-cracking.html", "id": "KITPLOIT:2008041285543762824", "lastseen": "2018-10-23T07:26:17", "modified": "2017-10-01T14:35:05", "objectVersion": "1.3", "published": "2017-10-01T14:35:05", "references": ["https://github.com/e-ago/bitcracker", "https://github.com/magnumripper/JohnTheRipper"], "reporter": "KitPloit", "title": "BitCracker - BitLocker Password Cracking Tool (Windows Encryption Tool)", "toolHref": "https://github.com/e-ago/bitcracker", "type": "kitploit", "viewCount": 0}, "differentElements": ["cvss", "cvelist"], "edition": 6, "lastseen": "2018-10-23T07:26:17"}, {"bulletin": {"bulletinFamily": "tools", "cvelist": ["CVE-2018-9995"], "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}, "description": "[  ](<https://2.bp.blogspot.com/-858TKLclqqs/Wch0FrbGz6I/AAAAAAAAI-A/Jl2ImBZRDL0OmD-4zFyGQuhvNkw-QFbHgCLcBGAs/s1600/BitLocker.png>)\n\n \nBitLocker is a full-disk encryption feature available in recent [ Windows ](<https://www.kitploit.com/search/label/Windows>) versions (Vista, 7, 8.1 and 10) Pro and Enterprise. BitCracker is a mono-GPU password [ cracking ](<https://www.kitploit.com/search/label/Cracking>) tool for memory units encrypted with the password authentication mode of BitLocker (see picture below). \n \n\n\n[  ](<https://3.bp.blogspot.com/-hBZjhXDhxok/Wch0WkUuXXI/AAAAAAAAI-E/agiQjixNsq0uIUNXo7OSnIRqK5qbwpaUwCLcBGAs/s1600/BitLocker_.png>)\n\n \n \nOur attack has been tested on several memory units encrypted with BitLocker running on [ Windows ](<https://www.kitploit.com/search/label/Windows>) 7, Window 8.1 and Windows 10 (both compatible and non-compatible mode). Here we present two implementations: CUDA and OpenCL. \n \n \n** Requirements ** \nFor CUDA implementation, you need at least CUDA 7.5 and an NVIDIA GPU with minimum cc3.5 (i.e. Kepler arch) \n \n** How To ** \nUse the build.sh script to build 3 executables: \n\n\n * hash extractor \n * BitCracker CUDA version \n * BitCracker OpenCL version \nThe executables are stored in the build directory. \nBefore starting the attack, you need to run bitcracker_hash to extract the hash from the encrypted memory unit. \n\n \n \n > ./build/bitcracker_hash -h\n \n Usage: ./build/bitcracker_hash -i <Encrypted memory unit> -o <output file>\n \n Options:\n \n -h, --help Show this help\n -i, --image Path of memory unit encrypted with BitLocker\n -o, --outfile Output file\n\nThe extracted hash is fully compatible with the John The Ripper format (see next Section). \nThen you can use the output hash file to run the BitCracker attack. \n\n \n \n > ./build/bitcracker_cuda -h\n \n Usage: ./build/bitcracker_cuda -f <hash_file> -d <dictionary_file>\n \n Options:\n \n -h, --help Show this help\n -f, --hashfile Path to your input hash file (HashExtractor output)\n -s, --strict Strict check (use only in case of false positives)\n -d, --dictionary Path to dictionary or alphabet file\n -g, --gpu GPU device number\n -t, --passthread Set the number of password per thread threads\n -b, --blocks Set the number of blocks\n\nNote: In case of false positives you can use the -s option, that is a more restrictive check on the correctness of the final result. Altough this check is empirically verified and it works with the images of this repo encrypted with Windows 7, 8.1 and 10, we can't guarantee that it doesn't lead to false negatives. Use -s option only if BitCracker returns several false positives. \nIn the the run_test.sh script there are several attack examples using the encrypted images provided in this repo: \n\n\n * imgWin7: memory unit encrypted with BitLocker using Windows 7 Enteprise edition OS \n * imgWin8: memory unit encrypted with BitLocker using Windows 8 Enteprise edition OS \n * imgWin10Compatible.vhd: memory unit encrypted with BitLocker (compatible mode) using Windows 10 Enteprise edition OS, \n * imgWin10NonCompatible.vhd: memory unit encrypted with BitLocker (NON compatible mode) using Windows 10 Enteprise edition OS, \n * imgWin10CompatibleLong27.vhd: memory unit encrypted with BitLocker (compatible mode) using Windows 10 Enteprise edition OS using the longest possible password (27 characters) \nCurrently, BitCracker is able to evaluate passwords having length between 8 (minimum password length) and 27 characters (implementation reasons). \nBitCracker doesn't provide any mask attack, cache mechanism or smart dictionary creation; therefore you need to provide your own input dictionary. \n \n** Performance ** \nHere we report best performance of BitCracker implementations tested on different GPUs \nGPU Acronim | GPU | Arch | CC | # SM | Clock | CUDA \n---|---|---|---|---|---|--- \nGFT | GeForce Titan | Kepler | 3.5 | 14 | 835 | 7.0 \nGTK80 | Tesla K80 | Kepler | 3.5 | 13 | 875 | 7.5 \nGFTX | GeForce Titan X | Maxwell | 5.2 | 24 | 1001 | 7.5 \nGTP100 | Telsa P100 | Pascal | 6.1 | 56 | 1328 | 8.0 \nAMDM | Radedon Malta | \\- | \\- | \\- | \\- | \\- \nPerformance: \nVersion | GPU | -t | -b | Passwords x kernel | Passwords/sec | Hash/sec \n---|---|---|---|---|---|--- \nCUDA | GFT | 8 | 13 | 106.496 | 303 | 635 MH/s \nCUDA | GTK80 | 8 | 14 | 114.688 | 370 | 775 MH/s \nCUDA | GFTX | 8 | 24 | 106.608 | 933 | 1.957 MH/s \nCUDA | GTP100 | 8 | 56 | 458.752 | 1.363 | 2.858 MH/s \nOpenCL | AMDM | 32 | 64 | 524.288 | 241 | 505 MH/s \nOpenCL | GFTX | 8 | 24 | 196.608 | 884 | 1.853 MH/s \n \n** John The Ripper ** \nWe released the OpenCL version as a plugin of the John The Ripper (bleeding jumbo) suite: \n\n\n * Wiki page: [ http://openwall.info/wiki/john/OpenCL-BitLocker ](<http://openwall.info/wiki/john/OpenCL-BitLocker>)\n * JtR source code: [ https://github.com/magnumripper/JohnTheRipper ](<https://github.com/magnumripper/JohnTheRipper>)\n \n** Next Release ** \nIn the next relese: \n\n\n * The maximum password lenght will be dynamic \n * Improve strict check with optional MAC verification to avoid any false positive \n \n\n\n** [ Download BitCracker ](<https://github.com/e-ago/bitcracker>) **\n", "edition": 2, "enchantments": {"score": {"modified": "2018-09-27T03:10:41", "value": 5.0, "vector": "NONE"}}, "hash": "cec366d2591f4a2fe61d639b9fb2b776ee15ef583d699c48d034a4e2ff617fe3", "hashmap": [{"hash": "0317b7a60189990b975c8110692dfbe5", "key": "description"}, {"hash": "8315c5eeaf200489bd3ebf95f66c4c29", "key": "references"}, {"hash": "f53d5bf72267786b4f994f9383d524ec", "key": "cvelist"}, {"hash": "250115f9731757eaace68a09026189ae", "key": "title"}, {"hash": "397e50eb4cab6109ef886f119bc559e9", "key": "modified"}, {"hash": "aba454e3574969396c0dddcb45011dcc", "key": "reporter"}, {"hash": "397e50eb4cab6109ef886f119bc559e9", "key": "published"}, {"hash": "743ae8897e4dd823fe541b5751961b02", "key": "href"}, {"hash": "4a931512ce65bdc9ca6808adf92d8783", "key": "bulletinFamily"}, {"hash": "a792e2393dff1e200b885c5245988f6f", "key": "cvss"}, {"hash": "4553be2119d862322dd6fec6bb385401", "key": "type"}, {"hash": "2741b1bee87e87f66213222b2c95936e", "key": "toolHref"}], "history": [], "href": "http://www.kitploit.com/2017/10/bitcracker-bitlocker-password-cracking.html", "id": "KITPLOIT:2008041285543762824", "lastseen": "2018-09-27T03:10:41", "modified": "2017-10-01T14:35:05", "objectVersion": "1.3", "published": "2017-10-01T14:35:05", "references": ["https://github.com/e-ago/bitcracker", "https://github.com/magnumripper/JohnTheRipper"], "reporter": "KitPloit", "title": "BitCracker - BitLocker Password Cracking Tool (Windows Encryption Tool)", "toolHref": "https://github.com/e-ago/bitcracker", "type": "kitploit", "viewCount": 0}, "differentElements": ["cvss", "cvelist"], "edition": 2, "lastseen": "2018-09-27T03:10:41"}, {"bulletin": {"bulletinFamily": "tools", "cvelist": ["CVE-2019-0708"], "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}, "description": "[  ](<https://2.bp.blogspot.com/-858TKLclqqs/Wch0FrbGz6I/AAAAAAAAI-A/Jl2ImBZRDL0OmD-4zFyGQuhvNkw-QFbHgCLcBGAs/s1600/BitLocker.png>)\n\n \nBitLocker is a full-disk encryption feature available in recent [ Windows ](<https://www.kitploit.com/search/label/Windows>) versions (Vista, 7, 8.1 and 10) Pro and Enterprise. BitCracker is a mono-GPU password [ cracking ](<https://www.kitploit.com/search/label/Cracking>) tool for memory units encrypted with the password authentication mode of BitLocker (see picture below). \n \n\n\n[  ](<https://3.bp.blogspot.com/-hBZjhXDhxok/Wch0WkUuXXI/AAAAAAAAI-E/agiQjixNsq0uIUNXo7OSnIRqK5qbwpaUwCLcBGAs/s1600/BitLocker_.png>)\n\n \n \nOur attack has been tested on several memory units encrypted with BitLocker running on [ Windows ](<https://www.kitploit.com/search/label/Windows>) 7, Window 8.1 and Windows 10 (both compatible and non-compatible mode). Here we present two implementations: CUDA and OpenCL. \n \n \n** Requirements ** \nFor CUDA implementation, you need at least CUDA 7.5 and an NVIDIA GPU with minimum cc3.5 (i.e. Kepler arch) \n \n** How To ** \nUse the build.sh script to build 3 executables: \n\n\n * hash extractor \n * BitCracker CUDA version \n * BitCracker OpenCL version \nThe executables are stored in the build directory. \nBefore starting the attack, you need to run bitcracker_hash to extract the hash from the encrypted memory unit. \n\n \n \n > ./build/bitcracker_hash -h\n \n Usage: ./build/bitcracker_hash -i <Encrypted memory unit> -o <output file>\n \n Options:\n \n -h, --help Show this help\n -i, --image Path of memory unit encrypted with BitLocker\n -o, --outfile Output file\n\nThe extracted hash is fully compatible with the John The Ripper format (see next Section). \nThen you can use the output hash file to run the BitCracker attack. \n\n \n \n > ./build/bitcracker_cuda -h\n \n Usage: ./build/bitcracker_cuda -f <hash_file> -d <dictionary_file>\n \n Options:\n \n -h, --help Show this help\n -f, --hashfile Path to your input hash file (HashExtractor output)\n -s, --strict Strict check (use only in case of false positives)\n -d, --dictionary Path to dictionary or alphabet file\n -g, --gpu GPU device number\n -t, --passthread Set the number of password per thread threads\n -b, --blocks Set the number of blocks\n\nNote: In case of false positives you can use the -s option, that is a more restrictive check on the correctness of the final result. Altough this check is empirically verified and it works with the images of this repo encrypted with Windows 7, 8.1 and 10, we can't guarantee that it doesn't lead to false negatives. Use -s option only if BitCracker returns several false positives. \nIn the the run_test.sh script there are several attack examples using the encrypted images provided in this repo: \n\n\n * imgWin7: memory unit encrypted with BitLocker using Windows 7 Enteprise edition OS \n * imgWin8: memory unit encrypted with BitLocker using Windows 8 Enteprise edition OS \n * imgWin10Compatible.vhd: memory unit encrypted with BitLocker (compatible mode) using Windows 10 Enteprise edition OS, \n * imgWin10NonCompatible.vhd: memory unit encrypted with BitLocker (NON compatible mode) using Windows 10 Enteprise edition OS, \n * imgWin10CompatibleLong27.vhd: memory unit encrypted with BitLocker (compatible mode) using Windows 10 Enteprise edition OS using the longest possible password (27 characters) \nCurrently, BitCracker is able to evaluate passwords having length between 8 (minimum password length) and 27 characters (implementation reasons). \nBitCracker doesn't provide any mask attack, cache mechanism or smart dictionary creation; therefore you need to provide your own input dictionary. \n \n** Performance ** \nHere we report best performance of BitCracker implementations tested on different GPUs \nGPU Acronim | GPU | Arch | CC | # SM | Clock | CUDA \n---|---|---|---|---|---|--- \nGFT | GeForce Titan | Kepler | 3.5 | 14 | 835 | 7.0 \nGTK80 | Tesla K80 | Kepler | 3.5 | 13 | 875 | 7.5 \nGFTX | GeForce Titan X | Maxwell | 5.2 | 24 | 1001 | 7.5 \nGTP100 | Telsa P100 | Pascal | 6.1 | 56 | 1328 | 8.0 \nAMDM | Radedon Malta | \\- | \\- | \\- | \\- | \\- \nPerformance: \nVersion | GPU | -t | -b | Passwords x kernel | Passwords/sec | Hash/sec \n---|---|---|---|---|---|--- \nCUDA | GFT | 8 | 13 | 106.496 | 303 | 635 MH/s \nCUDA | GTK80 | 8 | 14 | 114.688 | 370 | 775 MH/s \nCUDA | GFTX | 8 | 24 | 106.608 | 933 | 1.957 MH/s \nCUDA | GTP100 | 8 | 56 | 458.752 | 1.363 | 2.858 MH/s \nOpenCL | AMDM | 32 | 64 | 524.288 | 241 | 505 MH/s \nOpenCL | GFTX | 8 | 24 | 196.608 | 884 | 1.853 MH/s \n \n** John The Ripper ** \nWe released the OpenCL version as a plugin of the John The Ripper (bleeding jumbo) suite: \n\n\n * Wiki page: [ http://openwall.info/wiki/john/OpenCL-BitLocker ](<http://openwall.info/wiki/john/OpenCL-BitLocker>)\n * JtR source code: [ https://github.com/magnumripper/JohnTheRipper ](<https://github.com/magnumripper/JohnTheRipper>)\n \n** Next Release ** \nIn the next relese: \n\n\n * The maximum password lenght will be dynamic \n * Improve strict check with optional MAC verification to avoid any false positive \n \n\n\n** [ Download BitCracker ](<https://github.com/e-ago/bitcracker>) **\n", "edition": 20, "enchantments": {"dependencies": {"modified": "2019-10-18T14:34:04", "references": [{"idList": ["EDB-ID:47120"], "type": "exploitdb"}, {"idList": ["MSF:EXPLOIT/WINDOWS/RDP/CVE_2019_0708_BLUEKEEP_RCE", "MSF:AUXILIARY/SCANNER/RDP/CVE_2019_0708_BLUEKEEP"], "type": "metasploit"}, {"idList": ["QUALYSBLOG:563DC556FF331059CAC2F71B19B341B5"], "type": "qualysblog"}, {"idList": ["KITPLOIT:3746269283079108633", "KITPLOIT:8690827452472466093", "KITPLOIT:998955151150716619", "KITPLOIT:2846211113425563801", "KITPLOIT:2143278485443977074", "KITPLOIT:5772130773824454432", "KITPLOIT:8886349906352353597", "KITPLOIT:7460768340536359638", "KITPLOIT:4693152054138988283", "KITPLOIT:4482238198881011483"], "type": "kitploit"}, {"idList": ["MSRC:6A6ED6A5B652378DCBA3113B064E973B"], "type": "msrc"}, {"idList": ["TALOSBLOG:5757EE09BE22E4808719C348402D3F43"], "type": "talosblog"}, {"idList": ["OPENVAS:1361412562310108611"], "type": "openvas"}, {"idList": ["MYHACK58:62201994152", "MYHACK58:62201995881", "MYHACK58:62201994259", "MYHACK58:62201994154", "MYHACK58:62201994234", "MYHACK58:62201994153", "MYHACK58:62201994162"], "type": "myhack58"}, {"idList": ["SMNTC-108273"], "type": "symantec"}, {"idList": ["CVE-2019-0708"], "type": "cve"}, {"idList": ["F5:K25238311"], "type": "f5"}]}, "score": {"modified": "2019-10-18T14:34:04", "value": 4.8, "vector": "NONE"}}, "hash": "6da033fdb2ad46378e6dc3ba68db70885af62038924f694b405783be8642d8d4", "hashmap": [{"hash": "1c02263ec9e9872fe691f0953a820220", "key": "cvelist"}, {"hash": "0317b7a60189990b975c8110692dfbe5", "key": "description"}, {"hash": "8315c5eeaf200489bd3ebf95f66c4c29", "key": "references"}, {"hash": "250115f9731757eaace68a09026189ae", "key": "title"}, {"hash": "397e50eb4cab6109ef886f119bc559e9", "key": "modified"}, {"hash": "aba454e3574969396c0dddcb45011dcc", "key": "reporter"}, {"hash": "397e50eb4cab6109ef886f119bc559e9", "key": "published"}, {"hash": "743ae8897e4dd823fe541b5751961b02", "key": "href"}, {"hash": "edfca85c4c320ffaa9dcfdcb6a20ce1d", "key": "cvss"}, {"hash": "4a931512ce65bdc9ca6808adf92d8783", "key": "bulletinFamily"}, {"hash": "4553be2119d862322dd6fec6bb385401", "key": "type"}, {"hash": "2741b1bee87e87f66213222b2c95936e", "key": "toolHref"}], "history": [], "href": "http://www.kitploit.com/2017/10/bitcracker-bitlocker-password-cracking.html", "id": "KITPLOIT:2008041285543762824", "lastseen": "2019-10-18T14:34:04", "modified": "2017-10-01T14:35:05", "objectVersion": "1.3", "published": "2017-10-01T14:35:05", "references": ["https://github.com/e-ago/bitcracker", "https://github.com/magnumripper/JohnTheRipper"], "reporter": "KitPloit", "title": "BitCracker - BitLocker Password Cracking Tool (Windows Encryption Tool)", "toolHref": "https://github.com/e-ago/bitcracker", "type": "kitploit", "viewCount": 14}, "differentElements": ["cvss", "cvelist"], "edition": 20, "lastseen": "2019-10-18T14:34:04"}], "edition": 21, "hashmap": [{"key": "bulletinFamily", "hash": "4a931512ce65bdc9ca6808adf92d8783"}, {"key": "cvelist", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "cvss", "hash": "8cd4821cb504d25572038ed182587d85"}, {"key": "description", "hash": "0317b7a60189990b975c8110692dfbe5"}, {"key": "href", "hash": "743ae8897e4dd823fe541b5751961b02"}, {"key": "modified", "hash": "397e50eb4cab6109ef886f119bc559e9"}, {"key": "published", "hash": "397e50eb4cab6109ef886f119bc559e9"}, {"key": "references", "hash": "8315c5eeaf200489bd3ebf95f66c4c29"}, {"key": "reporter", "hash": "aba454e3574969396c0dddcb45011dcc"}, {"key": "title", "hash": "250115f9731757eaace68a09026189ae"}, {"key": "toolHref", "hash": "2741b1bee87e87f66213222b2c95936e"}, {"key": "type", "hash": "4553be2119d862322dd6fec6bb385401"}], "hash": "3e029b5f138aa9d123f98b6137c9eea3c3f0961aa44ca4964c06c2ac009c744d", "viewCount": 21, "enchantments": {"dependencies": {"references": [], "modified": "2019-10-18T16:35:01"}, "score": {"value": -0.0, "vector": "NONE", "modified": "2019-10-18T16:35:01"}, "vulnersScore": -0.0}, "objectVersion": "1.3", "toolHref": "https://github.com/e-ago/bitcracker", "scheme": null}