A short how-to for cracking DM-Crypt+LUKS block encryption passwords. Cracking LUKS passwords tend to take a long time because of the number of iterations used during the setup process. The process used to crack the passwords requires a binary dump of the header and some data. Then we use Hashcat to handle the cracking.
The process for cracking WPA/2 passwords is simple. capture the handshake between the access point and clients from the target network. crack the password with a password cracker like John the Ripper, Hashcat, or aircrack.
Cracking Password Protected RAR Archives with help from John the Ripper and Hashcat.
Cracking Password Protected ZIP Archives with help from John the Ripper and Hashcat.