01-09-2025, 09:24 PM
(01-09-2025, 02:53 PM)Snoopy Wrote: There are two possibilities to attack True/Veracrypt
the binary version, modes 137*** and the new hash based modes 294***, see wiki on that, i would prefer using the hashbased as for this you can attack multiple targets at once
you will need the pythonscript veracrypt2hashcat from the latest beta https://hashcat.net/beta/, located under the tools directory
because this script can export different types (normale, boot, boot + hidden) just extract the first 1MB from your disk
sudo dd if=/dev/sdb of=disk bs=1M count=1
sudo dd if=/dev/sdb1 of=part bs=1M count=1 *see below for that
now run the script with all three possibilities, the script will even tell you if the entropy is to low (so this option is wrong) you can also see this, because the hahsh will have many zeros
if the script tell you this on all 3 possibilities, maybe you have to textract from the first partition of your disk, not directly from disk (not sure on that, but you can try this on your own, just export also the first 1mb of the first partition, see above and run the script also on that file
Lol i did not know it also.
So i get 1b from my HDD with dd and from this file i create the hash with veracrypt2hashcat, right?
thank you very much