

Then you can use the output hash file to run the Bit Cracker attack. The extracted hash is fully compatible with the John The Ripper format. i, –image Path of memory unit encrypted with BitLocker The executables are stored in the build directory.īefore starting the attack, you need to run bitcracker_hash to extract the hash from the encrypted memory unit Use the build.sh script to build 3 executables:įor CUDA implementation, you need at least CUDA 7.5 and an NVIDIA GPU with minimum cc3.5 (i.e. USB Key Mode: The user must insert a USB device that contains a startup key into the computer to be able to boot the protected OS.īitCracker is a mono-GPU password cracking tool developed only for volumes encrypted with the password authentication mode.User authentication mode: This mode requires that the user provide some authentication to the pre-boot environment in the form of a pre-boot PIN or password.Transparent operation mode: This mode uses the capabilities of TPM 1.2 hardware to provide for a transparent user experience: the key used for disk encryption is encrypted by the TPMchip and will only be released to the OS loader code if the early boot files appear to be unmodified.BitLocker can use three authentication mechanisms in order to implement encryption: BitCracker is a mono-GPU password cracking tool for memory units encrypted with the password authentication mode of BitLocker. It is designed to protect data by providing encryption for entire volumes and BitCracker helps to play as a Password Cracking toolīitLocker is a full-disk encryption feature available in recent Windows versions (Vista, 7, 8.1 and 10) Pro and Enterprise.


BitLocker is a full disk encryption feature included with Windows Vista and later.
