Sorry but: TrueCrypt USB-Drive - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Support (https://hashcat.net/forum/forum-3.html) +--- Forum: hashcat (https://hashcat.net/forum/forum-45.html) +--- Thread: Sorry but: TrueCrypt USB-Drive (/thread-7331.html) |
Sorry but: TrueCrypt USB-Drive - Krampas - 02-27-2018 I know. I'm sorry. Here I go: What I've done:
I even tried to crack the examples from https://hashcat.net/wiki/doku.php?id=example_hashes, but they work flawlessly. Password is hashcat. Got that. So I think somethings wrong with my attempt to get the password hashes. I've also tried:
Any hints on what i'm doing wrong? Using hashcat 4.1.0 on Ubuntu 16.4. RE: Sorry but: TrueCrypt USB-Drive - undeath - 02-27-2018 Not sure why you tried skip=1993276928. According to the FAQ you need the first 512 bytes of /dev/sdc1. Is your password 0123456789 or 123456789? Are you using a hidden volume? RE: Sorry but: TrueCrypt USB-Drive - Krampas - 02-28-2018 (02-27-2018, 03:39 PM)undeath Wrote: Not sure why you tried skip=1993276928. According to the FAQ you need the first 512 bytes of /dev/sdc1.According to https://hashcat.net/wiki/doku.php?id=frequently_asked_questions#how_do_i_extract_the_hashes_from_truecrypt_volumes Rule 3.II: Quote:in case of a physical disk you need to copy the last 512 bytes of the *first logical volume*. First 512 bytes would be Rule 3.I for a single TC file. Which is not what I have or am I wrong? Also tried both without any success. password is 123456789 no leading 0 I used "Standard TrueCrypt volume", although the truecrypt2john.py script somehow got an hash for a hidden volume, which is also the hash, that resulted in the right password with John the Ripper. RE: Sorry but: TrueCrypt USB-Drive - undeath - 02-28-2018 oh, I think I misread that for "first". Are you sure you are using the correct hash mode? I don't know what Truecrypt's default settings are. |