• Install the tools

    • apt-get install cryptsetup
  • -y for password confirmation prompt

    • cryptsetup -y -v luksFormat /dev/sdx ## THIS DELETES ALL THE DATA
  • Open it and look at status

    • cryptsetup luksOpen /dev/sda1 sda1crypt
    • cryptsetup -v status sda1crypt
  • Zero the contents device (looks like random data to keyless observers)

    • dd if=/dev/zero of=/dev/mapper/sda1crypt bs=128M
    • NOTE: killall -USR1 dd will print status
  • Put a filesystem on it

    • mkfs.ext4 /dev/mapper/sda1crypt
  • Mount it

    • mkdir /mnt/sda1crypt
    • mount /dev/mapper/sda1crypt /mnt/sda1crypt
  • Unmount it

    • umount /mnt/sda1crypt
  • Unmap it

    • cryptsetup luksClose sda1crypt
  • Dump header

    • sudo cryptsetup luksHeaderBackup /dev/sda3 –header-backup-file luksHeader.bin
  • Test passphrase or keyfile

    • sudo cryptsetup open –verbose –test-passphrase luksHeader.bin
    • sudo cryptsetup open –verbose –test-passphrase /dev/sda3
    • sudo cryptsetup open –verbose –test-passphrase –key-file MyKeyFile.txt /dev/sda3
  • Add a new passphrase or keyfile

    • sudo cryptsetup luksAddKey /dev/sda3
    • sudo cryptsetup luksAddKey /dev/sda3 MyKeyFile.txt
  • See how many slots are active

    • sudo cryptsetup luksDump /dev/sda3
      • This will output all settings of luks for this partition.
  • Remove a password slot

    • sudo cryptsetup luksRemoveKey /dev/sda3
      • You have to enter the password which you want to delete (it will automatically find the correct password slot
    • sudo cryptsetup luksKillSlot /dev/sda3 2
      • This will delete password slot 2 (you have to enter the password of any other password slot, but not of slot 2
      • This works even if you don’t know the password of slot 2
    • sudo cryptsetup luksRemoveKey –key-file MyKeyFile.txt /dev/sda3
      • Removes the key file MyKeyFile.txt if it is valid