Extract hash from veracrypt encryption
#3
Yes, it's system drive + bootable

So im guessing i have to use this offset - bootable
So the command looks like this now "veracrypt2hashcat.py --offset=bootable \\.\physicaldrive1"

It returned a hash.

However the algo, im not sure how to access the dcsprop, because i can't open EFI folder. Do i have to mount it ?
Reply


Messages In This Thread
RE: Extract hash from veracrypt encryption - by zerozero - 04-06-2024, 01:19 PM