Extracting binary data from TrueCrypt Boot Volume and Cracking - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Deprecated; Previous versions (https://hashcat.net/forum/forum-29.html) +--- Forum: Old oclHashcat Support (https://hashcat.net/forum/forum-38.html) +--- Thread: Extracting binary data from TrueCrypt Boot Volume and Cracking (/thread-4586.html) |
Extracting binary data from TrueCrypt Boot Volume and Cracking - Shady_Wushu - 08-04-2015 I've recently been asked to give a shot at cracking a TrueCrypt boot volume. Having never done so before, I just wanted to sanity check what I've done. To extract the binary data needed for the crack, I ran the following: dd if=/dev/sdc of=/path/to/file.tc bs=1 skip=31744 count=512 Since this is a boot volume, the data should be at offset 31744 - according to the Wiki, the last sector of the first track. We're extracting 512 bytes to give to cudaHashcat. To crack it, we would then run: ./cudaHashcat64.bin -a 0 -m 6241 /path/to/file.tc /path/to/wordlists/ Assuming I was given the correct information and that the volume uses RIPEMD-160 and AES. Like I said, since this is the first TrueCrypt volume I've run, I just want to make sure I did this right. Thanks all. RE: Extracting binary data from TrueCrypt Boot Volume and Cracking - Shady_Wushu - 08-04-2015 I already realized the error I made. dd should be: dd if=/dev/sdc of=/path/to/file.tc bs=512 skip=62 count=1 I reversed count and bs, and skip should be number of sectors rather than bytes. RE: Extracting binary data from TrueCrypt Boot Volume and Cracking - atom - 08-05-2015 The resulting data should be the same, or not? RE: Extracting binary data from TrueCrypt Boot Volume and Cracking - Shady_Wushu - 08-05-2015 I thought skip uses the ibs rather than the bs, and ibs defaults to 512. I could be wrong though. RE: Extracting binary data from TrueCrypt Boot Volume and Cracking - Shady_Wushu - 08-05-2015 So I'm sure I have the right dd command for a boot volume now. However, it turns out this is simply an encrypted physical drive, not a system drive - why you'd do that to a 2 TB external USB is beyond me, but thats the situation I'm in. According to the wiki, I need to grab the last sector of the first logical volume. However, there is no partition table in a TrueCrypt encrypted disk, at least not in front of the encryption. How do I go about finding a logical volume if fdisk simply tells me there is no partition table? RE: Extracting binary data from TrueCrypt Boot Volume and Cracking - Shady_Wushu - 08-05-2015 Figured it out, just pulled the first 512 on the disk. |