(11 hours ago)b8vr Wrote: In hashcat there's a tools folder. It contains veracrypt2hashcat.py. Run that with the "hidden" option.
That will give you an actual hash you can work with in modules 294**
The header you need for the hidden container is located at a different offset from the outer container, which is what you extracted with your command.
That's awesome, thank you for pointing that out.
To extract the hidden header is this command correct?
Code:
python veracrypt2hashcat.py --offset hidden "NameOfContainer.hc" > hash.txt("NameOfContainer.hc" is replaced with the real name of the container that needs to be cracked)

