Truecrypted USB, almost there, tweaking help requested - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Support (https://hashcat.net/forum/forum-3.html) +--- Forum: hashcat (https://hashcat.net/forum/forum-45.html) +--- Thread: Truecrypted USB, almost there, tweaking help requested (/thread-7416.html) |
Truecrypted USB, almost there, tweaking help requested - md5.press - 04-04-2018 Hello! thanks in advance for reading. I am working on decrypting a Truecrypted USB key whose password is only half known to me. I was able to crack a test USB key encrypted with TC using hybrid (+mask) attack, so I know I'm on the right track. As for the target USB key, I have come up with the following command: Code: ./hashcat64.bin -m 6211 -a 7 -1 ?l?d?u ../liveHash/cryptodisk_sdc1.dd ?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1 password.txt --increment --increment-min 3 notes: password.txt only has one line and that is the half of the password I do know. increment min to 3 as I've made it there thus far in testing. My questions:
I don't have decent hardware at home (have just tested on my laptop), so I'm looking to invest in something that will allow me to run this efficiently, but I did want to reach out and see if I've at least got the right command for the job at this stage. Cheers, and thanks again for looking! Michel |