01-08-2017, 07:34 AM
(01-07-2017, 12:08 AM)duhblow7 Wrote: extract your veracrypt hash.
https://hashcat.net/wiki/frequently_aske...pt_volumes
the mask attacks will not be able to fulfill all of the variations you have proposed but it may fulfill a few. i think your best bet would be to come up with a script to generate a few hundred if not a few thousand mask attacks to cover all of the crazy variations you can come up with being a possibility. because you are so specific it doesn't seem like each mask attack would have a large keyspace. there better be a huge wallet.dat file chilling on there because this is a lot of work.
Ok so I think I've finally (6 hours of learning dd later) got the hash extracted, but I couldn't be sure whether or not I'd made it a hidden container so I guess I have to just run hashcat on both the first 512bytes and the 512bytes after the first 64k? There's no way to know?
The guy in this blog: http://www.williamkent.io/2016/09/11/how...veracrypt/ says he used python to generate his wordlist kind of like you mentioned, although his password sounded like it required a much simpler process.
And yea, the file is pretty fat. Enough so that I would thankfully throw a couple month's wages at it