Bitlocker2john.exe
dd if=/dev/sdb of=bitlocker_image.dd bs=512 status=progress bitlocker2john.exe bitlocker_image.dd > hash.txt Sample output (hash.txt):
Example:
cat hash.txt | grep -o '\$bitlocker\$0\$[^$]*\$[^$]*\$[^$]*\$[^$]*\$[^$]*\$[^$]*\$[^$]*' > hashcat_ready.txt Or use the --hashcat option if supported. john --format=bitlocker --wordlist=rockyou.txt hash.txt Step 5: Crack with hashcat (faster) hashcat -m 22100 -a 0 hashcat_ready.txt rockyou.txt 7. Options | Option | Description | |--------|-------------| | --extract | Extract recovery VMK (default) | | --nth | Nth key protector (0-based) | | --hashcat | Output hash in hashcat-compatible format | | --verbose | Show debug info | bitlocker2john.exe
For (mode 22100), you must convert:
# Extract hash from image bitlocker2john.exe encrypted.dd > hash.txt john --format=bitlocker hash.txt Crack with hashcat (after converting) hashcat -m 22100 hash.txt rockyou.txt dd if=/dev/sdb of=bitlocker_image