Yes, it's system drive + bootable
So im guessing i have to use this offset - bootable
So the command looks like this now "veracrypt2hashcat.py --offset=bootable \\.\physicaldrive1"
It returned a hash.
However the algo, im not sure how to access the dcsprop, because i can't open EFI folder. Do i have to mount it ?
So im guessing i have to use this offset - bootable
So the command looks like this now "veracrypt2hashcat.py --offset=bootable \\.\physicaldrive1"
It returned a hash.
However the algo, im not sure how to access the dcsprop, because i can't open EFI folder. Do i have to mount it ?