Hey,
i have a Samsung Note2 with the XXUEMK4 firmware. After encrypting my sdcard (ecryptfs) i did a wipe of my data on the phone(not the sdcard). Unfortunately i did not know about what a salt is, now i know
So after wiping i could not decrypt the sdcard, because it seems the salt is always different after wipe (i do know my password!).
It looks like the salt is 8 Byte long, which can be seen in the attachment source code, but I am not sure.
So my question is: can i find out the whole passphrase (password+salt) to access my sdcard by bruteforcing it?
Or is it even possible to get the mechanism the salt is being generated?
Thanks in advance
Best J
ecryptfs_kernel.h.txt (Size: 28.26 KB / Downloads: 4)
i have a Samsung Note2 with the XXUEMK4 firmware. After encrypting my sdcard (ecryptfs) i did a wipe of my data on the phone(not the sdcard). Unfortunately i did not know about what a salt is, now i know
![Wink Wink](http://hashcat.net/images/smilies/wink.gif)
It looks like the salt is 8 Byte long, which can be seen in the attachment source code, but I am not sure.
So my question is: can i find out the whole passphrase (password+salt) to access my sdcard by bruteforcing it?
Or is it even possible to get the mechanism the salt is being generated?
Thanks in advance
Best J
![.txt](http://hashcat.net/images/attachtypes/txt.gif)