Bruteforcing VeraCrypt drive while knowing password pattern
#4
(04-26-2021, 04:42 PM)hblender Wrote: since the mayority of veracrypt modes are somewhat slow, i suggest you using maskprocessor because it can generate candidates rejecting (almost*) the ones cotaining duplicated symbols and characters.
That being said, for 16 char long passwords i would try this

Code:
mp64 -r2 -q2 ?u?l?l!?u?l?l@?u?l?l#?u?l?l$ | hashcat -m <hash mode> hash.txt


This should go from Aab!Bcd@Cef#Dgh$ to Zzy!Yxw@Xvu#Wts$


And for, 12 char long passwords i would try this

Code:
mp64 -r2 -q2 -1 !@#$ ?u?l?l?1?u?l?l?1?u?l?l?1 | hashcat -m <hash mode> hash.txt


This should go from Aab!Bcd@Cef# to Zzy!Yxw@Xvu#


*sadly it mp only allow up to 2 sequential characters and up to 2 same characters in the candidate.

Thanks for this! Is there any solution how to run mp and hashcat simultaneously on windows?
Reply


Messages In This Thread
RE: Bruteforcing VeraCrypt drive while knowing password pattern - by enzou - 05-10-2021, 06:29 AM