you will need the first 512 bytes of the container see
https://hashcat.net/wiki/doku.php?id=fre...pt_volumes
and no, this type of hashcat will do everything for you will not happen (except the basic hash guessing)
the user has to know what he is doing, what he is attacking and he is in charge to prepare the target, hashlists, wordlists, masks, rules and so on (there are penty examples already shipped)
EDIT:
True/Veracrypt attack input is binary data, so you will "see" no hash for this, also, you have to provide a outputfile otherwise your found password is only shown on command line and maybe you missed it
https://hashcat.net/wiki/doku.php?id=fre...pt_volumes
and no, this type of hashcat will do everything for you will not happen (except the basic hash guessing)
the user has to know what he is doing, what he is attacking and he is in charge to prepare the target, hashlists, wordlists, masks, rules and so on (there are penty examples already shipped)
EDIT:
True/Veracrypt attack input is binary data, so you will "see" no hash for this, also, you have to provide a outputfile otherwise your found password is only shown on command line and maybe you missed it