decrypt a Twofish encrypted file - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Misc (https://hashcat.net/forum/forum-15.html) +--- Forum: General Talk (https://hashcat.net/forum/forum-33.html) +--- Thread: decrypt a Twofish encrypted file (/thread-2856.html) |
decrypt a Twofish encrypted file - m4rtin - 11-24-2013 I have a 50MiB encrypted file which was created with Sentry 2020(version 2.8) for Windows Mobile. This 50MiB file is a virtual volume which appears as a directory in Windows Mobile root directory once the correct password is provided and volume is mounted. Along with the 50MiB encrypted file, there is a 760 byte key-file: Code: root@T60:~# hexdump -C /media/0C64-8931/encrypted2.key According to security details of Sentry 2020, this 50MiB file is encrypted using a randomly generated key, which itself is encrypted using a user supplied password. The randomly generated key is stored in a 760 byte key file, encrypted with a user supplied password and a randomly generated "salt" value stored in the same file. This means that once I have decrypted the 760 byte key file I could access the content of the 50MiB file? Is there a way to tell which encryption method is used for a key file? For 50MiB file I chose Twofish encryption with 256 byte key. I would guess that the key file is encrypted with the same method. Is there a way to brute-force this key-file using hashcat? I guess not as this key-file is probably encrypted with Twofish which is not supported by hashcat. What tool should I use here? In addition, it's important to mention that while my password was ~15 characters long, I *think* I remember the characters and order of character to large extent in the password so number of variations is few thousands. RE: decrypt a Twofish encrypted file - m4rtin - 11-26-2013 I solved this in a way that I created a password file with maskprocessor. It contained less than 200k passwords all separated by carriage return and line feed. Then I made a Windows batch script which read those passwords line by line from the password file: Code: FOR /F "usebackq delims=" %a in ("C:\Users\winuser\Desktop\passfile.txt") do SentryCommand.exe mount /file test-volume.key /password %a /drive A /timeout 10 /volume encrypted-file ..and used those in Sentry 2020 command line interface: Code: Sentry.exe supports following command line options: RE: decrypt a Twofish encrypted file - atom - 11-26-2013 Cool, thanks for letting us now |