01-25-2019, 02:29 PM
(This post was last modified: 01-25-2019, 03:11 PM by lerafrequest.)
The next step is to define the mask.
According to the wiki page, ?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a means the password is 15 characters long. However, I could not find what to do if I already know a part of the password.
EDIT: Got it from a tutorial video. I need to do xxxxxxxxxxxx?a?a?a (x is the order-specific variable stating the characters that I know). So there is only one element left to consider: -m YYYYY. I have no idea what to type in there.
EDIT2: I found it from the example hashes table in the Wiki. I used the default settings when encrypting the file, which is VeraCrypt PBKDF2-HMAC-SHA512 + AES, so the hash-mode is 13721.
The file that contains the extracted hashes is called hases.tc and located in ~Desktop\ddump.
Thus, the final code that I need to run is as follows (though I'll need to replace the variables with corresponding numbers);
According to the wiki page, ?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a means the password is 15 characters long. However, I could not find what to do if I already know a part of the password.
EDIT: Got it from a tutorial video. I need to do xxxxxxxxxxxx?a?a?a (x is the order-specific variable stating the characters that I know). So there is only one element left to consider: -m YYYYY. I have no idea what to type in there.
EDIT2: I found it from the example hashes table in the Wiki. I used the default settings when encrypting the file, which is VeraCrypt PBKDF2-HMAC-SHA512 + AES, so the hash-mode is 13721.
The file that contains the extracted hashes is called hases.tc and located in ~Desktop\ddump.
Thus, the final code that I need to run is as follows (though I'll need to replace the variables with corresponding numbers);
Code:
hashcat -a 3 -m 13721 C:\Users\Hyper\Desktop\ddump\hashes.tc xxxxxxxxxxxx?a?a?a