![]() |
Cracking Verycrypt HDD with PIM - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Support (https://hashcat.net/forum/forum-3.html) +--- Forum: hashcat (https://hashcat.net/forum/forum-45.html) +--- Thread: Cracking Verycrypt HDD with PIM (/thread-12430.html) |
Cracking Verycrypt HDD with PIM - helloworld123 - 12-24-2024 Hello guys, i lost my password for my veracrypt crypted HDD. I know 99% of the password, thats why i want to try to bruteforce it. I also have a PIM, so i dont know, how to brute password + pim and same time, maybe someone can help me. Its a mask attack that i need, right? I have the hash in a .txt file. the passwordlist in a .txt file and the pim list in a .txt is this, the right command then? hashcat -m 13711 -a 0 -o cracked.txt hash.txt passwort.txt pim.txt does it work? i want it to test all password + pim combinations. thank you very much for help. RE: Cracking Verycrypt HDD with PIM - b8vr - 12-25-2024 Use --veracrypt-pim-start and --veracrypt-pim-stop. See hashcat --help for usage. And the mode you are choosing: well, if you know for sure that it's ripemd160 + xts 512, then yes. But if you have a hash and not a binary, then you need the 294xx modes. The default is 29421. Again, see hashcat --help. |