old TrueCrypt volumes
#2
First of all to answer you question, you normally would use a mask attack like this:
Code:
hashcat64.exe -m 6222 -a 3 --increment --increment-min 9 J:\tc\mooi2009.tc -2 "XxZzJjTtUuQq?d;:,.!@#$%&()_-+=" ?2?2?2?2?2?2?2?2?2?2?2?2

The problem is that it is difficult to brute-force (or use a mask attack) on passwords that are that long in general and it is even worse when it comes to a slow hash like truecrypt.

The best suggestion would be to remember as much as possible from the password and create a small dictionary with at most a few thousand/millions of password candidates and try those.
Trying each and every possible combination of all those characters is infeasible for such long passwords.
Another consideration would be to try to recover the password manager files from your hard drive, there are experts (data recovery specialists) that are able to recover files that you thought were already impossible to get back... the only problem is: you should not have used the drive a lot after the failure and therefore not overridden/damaged the files on the disk.


Messages In This Thread
old TrueCrypt volumes - by Liefde - 11-18-2017, 04:40 PM
RE: old TrueCrypt volumes - by philsmd - 11-18-2017, 05:29 PM