Please note, this is a STATIC archive of website hashcat.net from October 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

hashcat Forum

Full Version: APFS encrypted device with T2-Chip
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Following to this post, I successfully extracted an apfs-hash with apfs2hashcat and was able to attack it with hashcat (there was no T2-chip installed). Now the question arises how the hash behaves when a T2 chip is installed in the Macbook? Can you still read out the hash like that or what should i watch out for?
Is there anything to be considered when restoring the password or can you attack as usual, for example with wordlists and rules?
with the new t2 chip the keybag cannot be extracted from the disc image, so no tools can help you get the hash out. This can only be done with hardware