03-28-2017, 09:32 PM
Hi All,
Been trying to test a dictionary attack against a VeraCrypt container that I know the password for and not getting much joy.
I am able to successfully dictionary attack the TrueCrypt AES test file provided from this website so the process isnt going wrong there.
I believe I am not correctly extracting the hash from the VeraCrypt file.
On the wiki it says:
if you are cracking a single TrueCrypt file instead of a physical disk, you need the first 512 Bytes of the file.
So the command I am using with DD (on Windows) is:
dd.exe if=test of=1.tc bs=512 count=1
Also, someone mentioned that hashcat can be pointed directly at the VeraCrypt file? Can someone confirm if this is true please as I have tried that as well with no joy.
Many thanks all,
Been trying to test a dictionary attack against a VeraCrypt container that I know the password for and not getting much joy.
I am able to successfully dictionary attack the TrueCrypt AES test file provided from this website so the process isnt going wrong there.
I believe I am not correctly extracting the hash from the VeraCrypt file.
On the wiki it says:
if you are cracking a single TrueCrypt file instead of a physical disk, you need the first 512 Bytes of the file.
So the command I am using with DD (on Windows) is:
dd.exe if=test of=1.tc bs=512 count=1
Also, someone mentioned that hashcat can be pointed directly at the VeraCrypt file? Can someone confirm if this is true please as I have tried that as well with no joy.
Many thanks all,