Decrypting a veracrypt drive when the set of possible passwords is relatively small
#1
Hi everyone,

I have an external hard drive that is encrypted with veracrypt. Unfortunately, the password is not known anymore. However, the set of possible passwords is probably small enough (probably < 100 possible passwords of length at most 35, probably less) that I would like to brute force. The encrypted drive was only set up recently, so I guess/hope it is encrypted with the default settings.

I've read https://hashcat.net/wiki/doku.php?id=fre...pt_volumes, but I have no experience with hashcat. Say I have the following:
  • list of possible passwords
  • access to the external hard drive to extract the start bit

Could you please tell me which commands I should use for a start? I'm a bit overwhelmed with all the options. With an example dd and hashcat command, I could probably figure out the rest on my own or ask some follow-up questions.

Any help would be greatly appreciated!

Thanks!
Reply


Messages In This Thread
Decrypting a veracrypt drive when the set of possible passwords is relatively small - by NCoIaf3O - 11-30-2023, 01:44 AM