I've been away from my computer for a few months and forgot my Ubuntu login password. This is a problem since I have an encrypted home directory with lots of important files on it.
I came across this thread:
https://ubuntuforums.org/showthread.php?t=2252728
The guy who posted it claims to have solved the problem using John the Ripper with a python script called ecryptfs2john.py
Is this a brute force method? I have a feeling I used a really strong password so I don't know if that'll work. Another thread here talking about brute forcing:
Recovering data from a partition without the passphrase
Is brute forcing the only option here? If so, do you have the option of bruteforcing either the password or the wrapper passphrase? In this case, I have an idea of a number of different passwords I might have used, it's too much to try and guess manually because I probably prefixed the password with a symbol, and added numbers after, and also might have mixed up the cases of the characters. hashcat has a feature called "mask attack" which is kind of like an intelligent brute force attack, it doesn't just guess every possible combination of characters, instead it uses logic to generate a list of password guesses. Can John the Ripper do this too? Can hashcat be used to brute force login passwords like this?
Here's a couple of articles I found on using Hashcat to brute force linux disk encryption:
https://penguin-systems.com/node/8
https://blog.pnb.io/2018/02/bruteforcing-linux-full-disk-encryption.html