- Lab
- A Cloud Guru
Recover Data from Encrypted File Systems
In this exercise, you will recover an encrypted LUKS partition by using a backup LUKS header file. *This course is not approved or sponsored by Red Hat.*
Path Info
Table of Contents
-
Challenge
Unlock the encrypted device.
Review the contents of
/etc/crypttab
:cat /etc/crypttab
Check the mounts with
lsbkl
:lsblk
Review the contents of
/etc/fstab
:cat /etc/fstab
Attempt to mount
/luks
:mount /luks
Look for the unlocked device in
/dev/mapper
:ll /dev/mapper
Attempt to open manually:
cryptsetup luksOpen /dev/mapper/vg_1-lv_1 luks-vg_1-lv_1 --key-file /root/passphrase.key
View the key slots:
cryptsetup luksDump /dev/mapper/vg_1-lv_1
No key slots are in use. Locate the header backup in
/root/
:ll /root/
Restore header file:
cryptsetup luksHeaderRestore /dev/mapper/vg_1-lv_1 --header-backup-file /root/vg_1-lv_1.header
Type uppercase YES.
Attempt to open manually again (using same key and name as
/etc/crypttab
:cryptsetup luksOpen /dev/mapper/vg_1-lv_1 luks-vg_1-lv_1 --key-file /root/passphrase.key
Verify unlocked device:
ll /dev/mapper
-
Challenge
Mount the encrypted device.
Mount the unlocked device:
mount /luks/
View the files on the device:
ll /luks/
What's a lab?
Hands-on Labs are real environments created by industry experts to help you learn. These environments help you gain knowledge and experience, practice without compromising your system, test without risk, destroy without fear, and let you learn from your mistakes. Hands-on Labs: practice your skills before delivering in the real world.
Provided environment for hands-on practice
We will provide the credentials and environment necessary for you to practice right within your browser.
Guided walkthrough
Follow along with the author’s guided walkthrough and build something new in your provided environment!
Did you know?
On average, you retain 75% more of your learning if you get time for practice.