05-06-2015, 10:53 PM
(This post was last modified: 05-06-2015, 11:16 PM by timi2shoes.)
I am testing cracking the password of a known boot drive with oclhc but have been unable to get it working correctly.
Command used
I created a dd of the whole drive and have tried every combination of the 512 hash from the drive. I have taken the 512 bytes from the beginning of the drive, the end of the drive. The beginning and end of the first partition. The beginning and end of the 2nd partition.
I have been carving out the data to test using FTK Imager.
tree.JPG (Size: 12.52 KB / Downloads: 38)
truecrypt-info.JPG (Size: 8.99 KB / Downloads: 34)
As a side note, I have been able to test extracting the password correctly with other tools which required the first 64KB at the MBR.
Can anyone tell me what I might be doing wrong?
Command used
Code:
oclHashcat64.exe -m 6241 c:\inputfile-512b c:\test-words
I created a dd of the whole drive and have tried every combination of the 512 hash from the drive. I have taken the 512 bytes from the beginning of the drive, the end of the drive. The beginning and end of the first partition. The beginning and end of the 2nd partition.
I have been carving out the data to test using FTK Imager.
tree.JPG (Size: 12.52 KB / Downloads: 38)
truecrypt-info.JPG (Size: 8.99 KB / Downloads: 34)
As a side note, I have been able to test extracting the password correctly with other tools which required the first 64KB at the MBR.
Can anyone tell me what I might be doing wrong?