Yea I read the FAQ
Is there no windows tool for extracting raw-code?
Wow ok. I did not see that. In FAQ stood:
Thanks
I still need to know how to get those raw-data without linux/unix.
EDIT:
Ok I think I've got it now.
Created a new text-document and pasted the raw data "7F 13 4F 22 F5 etc" with my hexeditor in this file and overwrote everything.
Now it recovered the passwort "hashcat".
Thanks.
I hope this will now work for the bigger wordlist aswell.
Quote:You can extract the binary data from the raw disk, for example, with the Unix utility dd (e.g. use a block size of 512 and a count of 1).
Is there no windows tool for extracting raw-code?
(09-28-2017, 11:50 AM)philsmd Wrote: veracrypt has these hash modes (-m):
Therefore, your use of -m 6221 is completely wrong.
Wow ok. I did not see that. In FAQ stood:
Quote: The hashcat wiki lists some TrueCrypt example hashes (e.g. -m 6211, -m 6221, -m 6231 or -m 6241 depending on the exact TrueCrypt settings that were used when setting up the TrueCrypt volume). If you want to test/crack those example “hashes”, as always, use the password “hashcat” (without quotes).I thought they were the same.
The same procedure should also work for VeraCrypt volumes.
Thanks
I still need to know how to get those raw-data without linux/unix.
EDIT:
Ok I think I've got it now.
Created a new text-document and pasted the raw data "7F 13 4F 22 F5 etc" with my hexeditor in this file and overwrote everything.
Now it recovered the passwort "hashcat".
Thanks.
I hope this will now work for the bigger wordlist aswell.