Truecrypt
#6
just one simple thing you could and should do. create a similar container with known password (it could be similar to the one you are trying to crack, just remember always that this is just a test and your target container and hash should be backuped and not confused with this example run) and try to crack it. You will see exactly how the extraction and cracking works by following the steps in the FAQ and trying to crack it with the 1536 bit options.

If you do not know the hashing algorithm, you would need to try cracking the extracted bytes with all the 1536 bits variations for TrueCrypt. one after the other


The custom dict is just a list of password you come up with, one password per line. In the case of the example hash from https://hashcat.net/wiki/example_hashes it would need to contain (one of the many lines of the custom dictionary file) the password: hashcat
Reply


Messages In This Thread
Truecrypt - by 3di - 05-30-2020, 10:29 PM
RE: Truecrypt - by pbies - 05-31-2020, 04:06 AM
RE: Truecrypt - by philsmd - 05-31-2020, 08:46 AM
RE: Truecrypt - by 3di - 06-04-2020, 10:46 PM
RE: Truecrypt - by 3di - 06-14-2020, 11:59 PM
RE: Truecrypt - by philsmd - 06-15-2020, 08:52 AM
RE: Truecrypt - by 3di - 06-18-2020, 12:17 PM
RE: Truecrypt - by philsmd - 06-18-2020, 12:50 PM
RE: Truecrypt - by 3di - 06-18-2020, 09:04 PM
RE: Truecrypt - by undeath - 06-18-2020, 11:18 PM
RE: Truecrypt - by 3di - 07-06-2020, 09:05 PM