NTLM Kerberos bcrypt Wallets File Recovery Database Hashes WiFi Cracking Disk Encryption About Get Started
ENES中文RU

Disk Encryption Password Recovery

Recover passwords from VeraCrypt, BitLocker, LUKS, FileVault volumes and KeePass databases. GPU-powered attacks on encrypted disk containers.

Submit Hash →

Supported Encryption Types

VeraCrypt (Modes 13711 — 13773)

VeraCrypt supports multiple hash algorithms (SHA-256, SHA-512, Whirlpool, RIPEMD-160, Streebog) with high PBKDF2 iteration counts (up to 500,000+). This makes it one of the slowest hash types to crack. Each combination has its own hashcat mode.

We need the first 512 bytes of the VeraCrypt volume (the header) for cracking.

BitLocker (Mode 22100)

BitLocker uses AES-CCM or AES-XTS with a key derived from the user password via PBKDF2-SHA256. Hashcat mode 22100. Moderately slow — feasible for passwords up to moderate complexity.

LUKS (Mode 14600)

Linux Unified Key Setup. Uses PBKDF2 with configurable hash and very high iteration counts. One of the most computationally expensive targets. LUKS2 with Argon2 is even harder.

FileVault (Mode 16700)

macOS FileVault 2 uses AES-XTS with a PBKDF2-derived key. Moderately slow, similar in difficulty to BitLocker.

KeePass (Mode 13400)

KeePass password manager databases (.kdbx) use AES-KDF or Argon2 for key derivation. Configurable rounds make it computationally expensive but crackable with weak passwords.

Important Note

Disk encryption hashes are among the slowest to crack. Success depends heavily on password complexity. With partial password knowledge, feasibility increases significantly. Truly random passwords of 12+ characters are generally not feasible.

Pricing

Disk encryption / KeePass: $200+ per hash. Price depends on algorithm and expected GPU time. Free feasibility assessment. No result = no charge.

FAQ

How do I extract the hash?
VeraCrypt: first 512 bytes of the volume. BitLocker: bitlocker2hashcat tool. LUKS: luks2hashcat. KeePass: keepass2hashcat. Contact us — we'll guide you.
What's the success rate?
Lower than fast hashes due to extreme computation cost. With password hints it's feasible. Truly random long passwords are very unlikely.
VeraCrypt with cascaded encryption?
Cascaded algorithms (AES-Twofish-Serpent etc.) require trying all combinations, multiplying the work. Feasible only if password is weak.

Related Services

Need Encrypted Disk
Access Recovered?

Send your hash. Free feasibility assessment.

@HashCrackNet contact@hashcrack.net