Hash of veracrypt file - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Support (https://hashcat.net/forum/forum-3.html) +--- Forum: hashcat (https://hashcat.net/forum/forum-45.html) +--- Thread: Hash of veracrypt file (/thread-7424.html) |
Hash of veracrypt file - ThrowawayWhale - 04-06-2018 Hey all, I've spent quite a few hours this evening trying to do this myself, but I think I'm in over my head. Long story short, I have a veracrypt (.hc) file from years ago that I'd like to get in to, and I remember enough of the password to generate a list of <350 passwords (a few o or 0, e or 3 permutations in a 30+ character password). I thought I'd extracted the first 512 bytes correctly using dd for windows, and tried again with a hex editor to extract the 01 0A 2F format and the symbol format, and I've run the password list against all three hash files using various 137XY combos hoping I got one of them right. However, every attempt comes back exhausted. Code: Session..........: hashcat Is there a sure-file way to extract the hash that I couldn't possibly screw up? This is my starting code Code: hashcat64.exe -m 13723 hc3.hash test.dict Any help would be appreciated. RE: Hash of veracrypt file - undeath - 04-06-2018 To make sure you are correctly extracting the needed data create a new container with a known password and try to crack that one. RE: Hash of veracrypt file - ThrowawayWhale - 04-07-2018 My test worked, so I redid the hash anyway but no dice. Guess I don't remember the password as well as I had thought! Thanks for the suggestion. RE: Hash of veracrypt file - md5.press - 04-16-2018 hey man, not an expert but maybe this will help: it sounds like you know some of the password, and have come up with some variations that cover most cases and you now also need to tack on a couple digits? (you said with different last two digits, which may also refer to the -m switch, correct me if I'm wrong) If so, what you want is a hybrid attack with a mask. This basically takes a left or right hand side and appends a mask (mask being a group of characters to combine in all possible combinations). `hashcat64.exe -m XXXXX -a 7 yourhash.dd test.dict ?a?a` this command would append two characters of any type to each entry in the dictionary (I believe). You can look up hybrid + mask attacks in the docs for more details. Another alternative, if you know the basic 30 characters but not all the variations you may have used (3 for e etc), then consider looking at the LeetSpeak rule. This does exactly that to a wordlist, substituting characters for their variants (l for 1 etc). Good luck! |