Veracrypt
#2
(03-21-2024, 02:35 AM)rnekdo Wrote: 1. the documentation says if you use a hidden partition or volume, you need to skip the first 64K bytes (65536) and extract the next 512 bytes. But what if the volume also has a regular partition besides for the hidden one? So there are two different passwords for each one. How do you extract the necessary bytes for the regular partition (not the hidden one)?

2. Is there an alternative to DD for Windows in order to extract the necessary bytes more easily (without the use of WSL)?

3. Since it could take a long time to crack a Veracrypt password and use a lot of resources, would using a laptop or a computer with an adequate GPU, degrade the computer or laptop in any way by using it for a few months for example in this way (for cracking)? Or is it the same as playing games on the computer/laptop and doesnt really degrade it?

Thank you.


1. If it's a file or a partition (not bootable) then the header is the 512 bytes from offset 0.

2. I would advise you to use veracrypt2hashcat, which can be found in the tools folder in hashcat 6.2.6. That will give you the header formatted as a hash. It uses modes 297xx

3. Don't know. But having anything running for a month, especially on a laptop, usually means a badly planned attack. If your plan is to brute force, you might as well give up before starting.
Reply


Messages In This Thread
Veracrypt - by rnekdo - 03-21-2024, 02:35 AM
RE: Veracrypt - by b8vr - 03-22-2024, 12:25 AM