Cracking Veracrypt hash
#4
Hi,

Thanks! I was wondering how VeraCrypt knows which hash to use, and why it determines it so quickly when I manually type the password.
Very good hint!

My file looks like this—I assume my hash is SHA-512 (please confirm):

<?xml version="1.0" encoding="utf-8"?>
<VeraCrypt>
<configuration>
<config key="PasswordType">0</config>
<config key="PasswordMsg">Password: </config>
<config key="PasswordPicture">login.bmp</config>
<config key="HashMsg">(0) TEST ALL (1) SHA512 (2) WHIRLPOOL (3) SHA256 (4) RIPEMD160 (5) STREEBOG
Hash: </config>
<config key="Hash">1</config>
<config key="HashRqt">0</config>
<config key="PimMsg">PIM (Leave empty for default): </config>
<config key="Pim">0</config>
<config key="PimRqt">1</config>
<config key="AuthorizeVisible">0</config>
<config key="AuthorizeRetry">10</config>
<config key="DcsBmlLockFlags">0</config>
<config key="DcsBmlDriver">0</config>
<config key="ActionSuccess"></config>
</configuration>
</VeraCrypt>

Is there a way to determine what type of XTS it is? It’s crucial for performance.


Regarding the keyboard layout, I'm using US. But thanks for the nice idea.


So if it would be SHA512 seems I have to build better dictionary.
Reply


Messages In This Thread
Cracking Veracrypt hash - by pw1 - 12-25-2024, 10:26 AM
RE: Cracking Veracrypt hash - by pw1 - 12-31-2024, 07:30 PM
RE: Cracking Veracrypt hash - by b8vr - 12-31-2024, 11:46 PM
RE: Cracking Veracrypt hash - by pw1 - 01-01-2025, 12:31 AM
RE: Cracking Veracrypt hash - by b8vr - 01-01-2025, 03:46 AM
RE: Cracking Veracrypt hash - by Johnhancock - 01-02-2025, 02:26 AM
RE: Cracking Veracrypt hash - by TheBogeyman - 01-02-2025, 07:31 AM