Cracking a Truecrypt Container - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Support (https://hashcat.net/forum/forum-3.html) +--- Forum: hashcat (https://hashcat.net/forum/forum-45.html) +--- Thread: Cracking a Truecrypt Container (/thread-8106.html) |
Cracking a Truecrypt Container - Cherubsamuel - 01-27-2019 Is it possible to crack the Truecrypt Container password ? The encryption method was AES-Twofish-Serpent SHA 512 and the password length was 32 characters with words in different languages, letters, numbers and special characters. Can I recover my password with hashcat ? If yes which options do I have to specify? RE: Cracking a Truecrypt Container - royce - 01-27-2019 That's hashcat mode 6223 (where 3 = "all" (all three algorithms)): Code: 62XY | TrueCrypt | Full-Disk Encryption (FDE) You can practice and validate your approach against this container with a known password ('hashcat'): https://github.com/hashcat/hashcat/blob/master/tools/tc_tests/hashcat_sha512_aes-twofish-serpent.tc?raw=true You can do a basic mask attack like so: hashcat -a 3 -w 4 -m 6223 --potfile-path=./test.potfile hashcat_sha512_aes-twofish-serpent.tc hashca?l It sounds like your candidate wordlist will be complex; that will take some additional work (but can be done external to hashcat, as in "script_thing | hashcat -a 0 [...]" RE: Cracking a Truecrypt Container - Cherubsamuel - 01-28-2019 (01-27-2019, 10:30 PM)royce Wrote: That's hashcat mode 6223 (where 3 = "all" (all three algorithms)): Ok,Thanks |