11-30-2023, 01:44 AM
Hi everyone,
I have an external hard drive that is encrypted with veracrypt. Unfortunately, the password is not known anymore. However, the set of possible passwords is probably small enough (probably < 100 possible passwords of length at most 35, probably less) that I would like to brute force. The encrypted drive was only set up recently, so I guess/hope it is encrypted with the default settings.
I've read https://hashcat.net/wiki/doku.php?id=fre...pt_volumes, but I have no experience with hashcat. Say I have the following:
Could you please tell me which commands I should use for a start? I'm a bit overwhelmed with all the options. With an example dd and hashcat command, I could probably figure out the rest on my own or ask some follow-up questions.
Any help would be greatly appreciated!
Thanks!
I have an external hard drive that is encrypted with veracrypt. Unfortunately, the password is not known anymore. However, the set of possible passwords is probably small enough (probably < 100 possible passwords of length at most 35, probably less) that I would like to brute force. The encrypted drive was only set up recently, so I guess/hope it is encrypted with the default settings.
I've read https://hashcat.net/wiki/doku.php?id=fre...pt_volumes, but I have no experience with hashcat. Say I have the following:
- list of possible passwords
- access to the external hard drive to extract the start bit
Could you please tell me which commands I should use for a start? I'm a bit overwhelmed with all the options. With an example dd and hashcat command, I could probably figure out the rest on my own or ask some follow-up questions.
Any help would be greatly appreciated!
Thanks!