Cracking Veracrypt hash
#2
Hello,

Short update:
- I was able to confirm in the lab that dd if=/dev/nvme0n1 of=/root/hash bs=1 count=512 skip=31744 works as expected.
- After extracting the data, I successfully cracked the password in my lab.
- I also confirmed that veracrypt2hash (without the --offset bootable flag) properly converts data to a hash. I was able to crack this hash in my lab as well.

However, I am unable to crack the proper hash on my disk:
1. I extracted the data exactly as above: dd if=/dev/nvme0n1 of=/root/hash bs=1 count=512 skip=31744.
2. I extracted the data using dd if=/dev/nvme0n1 of=/root/hash bs=512 count=5120 and then used veracrypt2hash, receiving the same hash as in point #1.

In both cases, I was unable to crack my password.
For hash im using -m 24921 and for raw data 13721
I generated passwords using my suspect words. I created a list of 5–10 different words and tried permutations several times without success.
Of course i double check my word list seems should be good.

After 7 days of trying, I’m starting to lose faith.
I would be grateful for ANY suggestions.
Reply


Messages In This Thread
Cracking Veracrypt hash - by pw1 - 12-25-2024, 10:26 AM
RE: Cracking Veracrypt hash - by pw1 - 12-31-2024, 07:30 PM
RE: Cracking Veracrypt hash - by b8vr - 12-31-2024, 11:46 PM
RE: Cracking Veracrypt hash - by pw1 - 01-01-2025, 12:31 AM
RE: Cracking Veracrypt hash - by b8vr - 01-01-2025, 03:46 AM
RE: Cracking Veracrypt hash - by Johnhancock - 01-02-2025, 02:26 AM
RE: Cracking Veracrypt hash - by TheBogeyman - 01-02-2025, 07:31 AM