Ah, ok. That means the option "straight". I was not able to figure this out, because "straight" is not mentioned in the wiki in the section "attack modes". There you only find "dictionary attack".
For the combinatory attack this would then be:
cudaHashcat-plus64.exe -m 6221 -a 1 "test2.tc" "dict_test.txt" "dict_test.txt"
Ok, this works. Thank you for your help.
For the truecrypt-options: As far as I understood they are pretty new and even not shown on the appropriate sections of hashcat suite on the website. Does anyone know, what the current status for the non-AES-encryption (and the combinations) is? Or when they will be available?
EDIT: Ok, I found the answer for my truecrypt-question in this thread. As far as I understood atom is working on the other encryption methods. In the meantime would there be another way to try the recovery? With my beginners knowledge? Iam afraid the answer is no
For the combinatory attack this would then be:
cudaHashcat-plus64.exe -m 6221 -a 1 "test2.tc" "dict_test.txt" "dict_test.txt"
Ok, this works. Thank you for your help.
For the truecrypt-options: As far as I understood they are pretty new and even not shown on the appropriate sections of hashcat suite on the website. Does anyone know, what the current status for the non-AES-encryption (and the combinations) is? Or when they will be available?
EDIT: Ok, I found the answer for my truecrypt-question in this thread. As far as I understood atom is working on the other encryption methods. In the meantime would there be another way to try the recovery? With my beginners knowledge? Iam afraid the answer is no