02-06-2020, 04:50 PM
Following to this post, I successfully extracted an apfs-hash with apfs2hashcat and was able to attack it with hashcat (there was no T2-chip installed). Now the question arises how the hash behaves when a T2 chip is installed in the Macbook? Can you still read out the hash like that or what should i watch out for?
Is there anything to be considered when restoring the password or can you attack as usual, for example with wordlists and rules?
Is there anything to be considered when restoring the password or can you attack as usual, for example with wordlists and rules?