01-30-2022, 05:31 PM
I want to know if the hashcat software supports getting the hash for me if I supply the encrypted container file on the commandline?
Because, that's what I've been trying and I am not having any success in hashcat cracking my "known" password.
I'm giving hashcat all characters of my password except 1 letter and it's not finding the password. But the target.hash shows up as the encrypted container file and not the hash itself, so I would really like to see this software update the user better about what it found and what it is doing. Like, "Processing encrypted container", "Found Encrypted Container Hash", and show the real hash target and not just the filename.
The flexibility to allow the dumb end-user to provide the TrueCrypt/VeraCrypt container name and have the hashcat get the hash for them would be incredibly wonderful.
Is this functionality present now, and can it be in the future?
Thanks for reading!
Because, that's what I've been trying and I am not having any success in hashcat cracking my "known" password.
I'm giving hashcat all characters of my password except 1 letter and it's not finding the password. But the target.hash shows up as the encrypted container file and not the hash itself, so I would really like to see this software update the user better about what it found and what it is doing. Like, "Processing encrypted container", "Found Encrypted Container Hash", and show the real hash target and not just the filename.
The flexibility to allow the dumb end-user to provide the TrueCrypt/VeraCrypt container name and have the hashcat get the hash for them would be incredibly wonderful.
Is this functionality present now, and can it be in the future?
Thanks for reading!