WD MyCloudEX2Ultra ...
 
Notifications
Clear all

WD MyCloudEX2Ultra LUKs Passphrase

4 Posts
3 Users
0 Likes
1,995 Views
JaredDM
(@jareddm)
Posts: 118
Estimable Member
Topic starter
 

Just a general question here. Does anyone know if Western Digital uses a common passphrase for the LUKs encryption on their MyCloudEX2Ultra NAS units? Or, is it a random unique passphrase on each unit?

 
Posted : 08/04/2020 3:06 pm
(@trewmte)
Posts: 1877
Noble Member
 

Just a general question here. Does anyone know if Western Digital uses a common passphrase for the LUKs encryption on their MyCloudEX2Ultra NAS units? Or, is it a random unique passphrase on each unit?

Are you able to memory dump to identify LUKS encryption on Linux system (e.g. XTS encryption 2 256 bit AES keys hashed together)?

Maybe a long shot; create a word list from any memory dump? Hashcat list, another word or manipulated list might help where LUKS encrypted is active and the hash pulled …

Just some random thoughts…

 
Posted : 08/04/2020 6:00 pm
JaredDM
(@jareddm)
Posts: 118
Estimable Member
Topic starter
 

That's pretty difficult on a burned out NAS. Fortunately, it seems you can migrate these drives to another same model NAS, so I think that'll solve the issue for this case anyway.

But, it's still a curiosity. If I knew that they used a common passphrase (which WD commonly does) it'd probably be worth bruteforcing it once to know what it is and make future recoveries easier.

 
Posted : 08/04/2020 7:32 pm
LeGioN
(@legion)
Posts: 51
Trusted Member
 

If it is not updated you could always try the admin username and password that they had hardcoded into certain of the devices.

Username mydlinkBRionyg
Password abc12345cba

These are the ones that should be affected by the hardcoded username and passwords.

My Cloud
My Cloud Mirror
My Cloud Gen 2
My Cloud PR2100
My Cloud PR4100
My Cloud EX2 Ultra
My Cloud EX2
My Cloud EX4
My Cloud EX2100
My Cloud EX4100
My Cloud DL2100
My Cloud DL4100

/LeGioN

 
Posted : 08/04/2020 8:38 pm
Share: