Getting a Hash Via DD From a VeraCrypt File
#1
Hi All,

Been trying to test a dictionary attack against a VeraCrypt container that I know the password for and not getting much joy.

I am able to successfully dictionary attack the TrueCrypt AES test file provided from this website so the process isnt going wrong there.

I believe I am not correctly extracting the hash from the VeraCrypt file.
On the wiki it says:
if you are cracking a single TrueCrypt file instead of a physical disk, you need the first 512 Bytes of the file.
So the command I am using with DD (on Windows) is:
dd.exe if=test of=1.tc bs=512 count=1

Also, someone mentioned that hashcat can be pointed directly at the VeraCrypt file? Can someone confirm if this is true please as I have tried that as well with no joy.

Many thanks all,


Messages In This Thread
Getting a Hash Via DD From a VeraCrypt File - by SilvaNights - 03-28-2017, 09:32 PM