This podcast is sponsored by Arctic Wolf, whose Concierge Security teams Monitor, Detect and Respond to Cyber threats 24/7 for thousands of customers around the world. Arctic Wolf. Redefining cybersecurity. Visit Arcticwolf.com/7MS to learn more.

Believe it or not I'm pentesting your stuff
I never thought I could feel so free-hee-hee
I compromised one of your Domain Admins
Who it could be? The guy with "Password123"

In today's episode we're talking all about building your own password-cracking rig! "Wait a minute!" you say. "Are you abandoning the Paperspace password cracking in the cloud thing?" Nope! I'm just bringing that methodology "in house" for a little better opsec and also because last year on Paperspace I spent thousands of dollars.

First things first - here's the hardware I ended up with:

From there, I built a basic Ubuntu server box as follows:

I made a 100gig EFI partition, 100 gig EXT4 and then marked the rest of the disk space as not used

Once Ubuntu is installed, I did a bunch of the following command line stuff to get the not used partition encrypted:

sudo apt install cryptsetup

fdisk -l (to list partitions)

cryptsetup -y -v luksFormat /dev/nvme0n1p3 (replace this name with the free space one)

Create a mapping with:

cryptsetup luksOpen /dev/nvme0n1p3 hashtopia

Check status:

ls -l /dev/nvme0n1p3

Format the partition

dd if=/dev/zero of=/dev/mapper/hashtopia status=progress

Now format it as ext4 and mount it:

mkfs.ext4 /dev/mapper/hashtopia
mkdir /cryptkeeper
mount /dev/mapper/hashtopia /cryptkeeper

For future mounts (after a reboot), do:

cryptsetup luksOpen /dev/nvme0n1p3 hashtopia
mount /dev/mapper/hashtopia /cryptkeeper

Now you can follow the gist I wrote to get the drivers installed and start crackin'!!!