Extracting binary data from TrueCrypt Boot Volume and Cracking
#5
So I'm sure I have the right dd command for a boot volume now. However, it turns out this is simply an encrypted physical drive, not a system drive - why you'd do that to a 2 TB external USB is beyond me, but thats the situation I'm in. According to the wiki, I need to grab the last sector of the first logical volume. However, there is no partition table in a TrueCrypt encrypted disk, at least not in front of the encryption. How do I go about finding a logical volume if fdisk simply tells me there is no partition table?


Messages In This Thread
RE: Extracting binary data from TrueCrypt Boot Volume and Cracking - by Shady_Wushu - 08-05-2015, 03:33 PM