Skip to main content
  1. CTF Writeups/

Bitlocker-1 - picoCTF 2025

·168 words·1 min
picoCTF2025 Forensics Bitlocker John The Ripper
Miles Handelman
Author
Miles Handelman
Jacky is not very knowledgable about the best security passwords and used a simple password to encrypt their BitLocker drive. See if you can break through the encryption!
Download the disk image here

This challenge gave us the dd file bitlocker-1.dd and our job is to find the password to the BitLocker drive. The scenario states that Jacky used a simple password to encrypt their drive, so I knew that this challenge would be one which involves brute forcing the password using John the Ripper or HashCat with a known wordlist such as rockyou.

After mounting the image and extracting the BitLocker hash from the image using the command
bitlocker2john -i bitlocker-1.dd > bitlocker_hash.txt

Then we loaded these hashes up into John the Ripper and let it run for a while until it hit a password.
john --wordlist=rockyou.txt --format=bitlocker bitlocker_hash.txt

After a while, it stumbled on the password to be ‘jacqueline’, which upon use gave us access to the files including flag.txt. which contained the flag. flag: picoCTF{us3_b3tt3r_p4ssw0rd5_pl5!_3242adb1}

Related

Event-Viewing - picoCTF 2025
·374 words·2 mins
picoCTF2025 Forensics Event Viewer
Ph4nt0m 1ntrud3r - picoCTF 2025
·232 words·2 mins
picoCTF2025 Forensics Wireshark
RED - picoCTF 2025
·86 words·1 min
picoCTF2025 Forensics Steganography
flags are stepic - picoCTF 2025
·132 words·1 min
picoCTF2025 Forensics Python
Eavesdrop - picoGym
·182 words·1 min
picoGym Forensics Wireshark
Matryoshka Doll - picoGym
·106 words·1 min
picoGym Forensics Steganography