09-29-2017, 11:48 AM
Hashcat, like any other cracker I know and also all underlying hash algorithm, work with bytes.
If you use a UTF-8 password which is 2 bytes long, your mask also must be 2 bytes.
Therefore to troubleshoot your problem you must:
1. use more than just length 1 (at least to test), e.g. --increment -1 charsets/standard/German/de_cp1252.hcchr ?1?1?1?1
2. try with different encodings.... how do you know that veracrypt uses cp1252 encoding? ... my guess is that it rather uses utf-8 instead
If you use a UTF-8 password which is 2 bytes long, your mask also must be 2 bytes.
Therefore to troubleshoot your problem you must:
1. use more than just length 1 (at least to test), e.g. --increment -1 charsets/standard/German/de_cp1252.hcchr ?1?1?1?1
2. try with different encodings.... how do you know that veracrypt uses cp1252 encoding? ... my guess is that it rather uses utf-8 instead