Decoding Truecrypt problem
#4
1: yes, if it can crack in 6211, it can also be cracked with 6212 and 6313. This is true for all Truecrypt and veracrypt modes, that if you use a mode 3 - xts 1536 - it will also encounter xts 512 and xts 1024.
2: truecrypt2hashcat.py is located in the hashcat/tools folder. Just run it with -h, and then you can see how to use it. It's very simple.
3 : custom charset without a mask? That doesn't make sense. Charsets are used with masks, so not sure what you mean. But yes, they can be customized using -1, -2, -3 and -4. Fx -1 abc -2 @% -3 ?1?2 ?l?1?3?d will bruteforce a 4-char string trying lowercase a-z on position 1, lowercase abc on position 2, lowercase abc and special chars @% on position 3 and then digits 0-9 on position 4.
4: the last part of your question I'm not sure I understand, but in the examples I supplied in my first response, the space is escaped using \ so the mask "?s\ ?s?s?s" will create 5 char strings of special chars in position 1, a space in position 2 and special chars in positions 3, 4 and 5. In this case with a space, the " " are needed, otherwise hashcat will not interpret it properly.
Reply


Messages In This Thread
Decoding Truecrypt problem - by Bartholomew - 05-19-2025, 01:40 PM
RE: Decoding Truecrypt problem - by b8vr - 05-20-2025, 12:11 AM
RE: Decoding Truecrypt problem - by Bartholomew - 05-23-2025, 12:22 AM
RE: Decoding Truecrypt problem - by b8vr - 05-24-2025, 01:35 AM