hashcat Forum
Cracking a Truecrypt Container - Printable Version

+- hashcat Forum (https://hashcat.net/forum)
+-- Forum: Support (https://hashcat.net/forum/forum-3.html)
+--- Forum: hashcat (https://hashcat.net/forum/forum-45.html)
+--- Thread: Cracking a Truecrypt Container (/thread-8106.html)



Cracking a Truecrypt Container - Cherubsamuel - 01-27-2019

Is it possible to crack the Truecrypt Container password ?

The encryption method was  AES-Twofish-Serpent SHA 512
and the password length was 32 characters with words in different languages, letters, numbers and special characters.
 
Can I recover my password with  hashcat ?
If yes which options do I have to specify?


RE: Cracking a Truecrypt Container - royce - 01-27-2019

That's hashcat mode 6223 (where 3 = "all" (all three algorithms)):

Code:
  62XY | TrueCrypt                                        | Full-Disk Encryption (FDE)
...
    X  | 2 = PBKDF2-HMAC-SHA512                           | Full-Disk Encryption (FDE)
...
     Y | 3 = XTS 1536 bit all                             | Full-Disk Encryption (FDE)

You can practice and validate your approach against this container with a known password ('hashcat'):

https://github.com/hashcat/hashcat/blob/master/tools/tc_tests/hashcat_sha512_aes-twofish-serpent.tc?raw=true

You can do a basic mask attack like so:

hashcat -a 3 -w 4 -m 6223 --potfile-path=./test.potfile hashcat_sha512_aes-twofish-serpent.tc hashca?l

It sounds like your candidate wordlist will be complex; that will take some additional work (but can be done external to hashcat, as in "script_thing | hashcat -a 0 [...]"


RE: Cracking a Truecrypt Container - Cherubsamuel - 01-28-2019

(01-27-2019, 10:30 PM)royce Wrote: That's hashcat mode 6223 (where 3 = "all" (all three algorithms)):

Code:
  62XY | TrueCrypt                                        | Full-Disk Encryption (FDE)
...
    X  | 2 = PBKDF2-HMAC-SHA512                           | Full-Disk Encryption (FDE)
...
     Y | 3 = XTS 1536 bit all                             | Full-Disk Encryption (FDE)

You can practice and validate your approach against this container with a known password ('hashcat'):

https://github.com/hashcat/hashcat/blob/master/tools/tc_tests/hashcat_sha512_aes-twofish-serpent.tc?raw=true

You can do a basic mask attack like so:

hashcat -a 3 -w 4 -m 6223 --potfile-path=./test.potfile hashcat_sha512_aes-twofish-serpent.tc hashca?l

It sounds like your candidate wordlist will be complex; that will take some additional work (but can be done external to hashcat, as in "script_thing | hashcat -a 0 [...]"

Ok,Thanks