Posts: 2
	Threads: 1
	Joined: Jan 2019
	
	
 
	
	
		Is it possible to crack the Truecrypt Container password ?
The encryption method was  AES-Twofish-Serpent SHA 512
 and the password length was 32 characters with words in different languages, letters, numbers and special characters.
 
Can I recover my password with  hashcat ?
If yes which options do I have to specify?
	
	
	
	
	
 
 
	
	
	
		
	Posts: 929
	Threads: 4
	Joined: Jan 2015
	
	
 
	
		
		
		01-27-2019, 10:30 PM 
(This post was last modified: 01-27-2019, 10:31 PM by royce.)
		
	 
	
		That's hashcat mode 6223 (where 3 = "all" (all three algorithms)):
Code:
  62XY | TrueCrypt                                        | Full-Disk Encryption (FDE)
...
    X  | 2 = PBKDF2-HMAC-SHA512                           | Full-Disk Encryption (FDE)
...
     Y | 3 = XTS 1536 bit all                             | Full-Disk Encryption (FDE)
You can practice and validate your approach against this container with a known password ('hashcat'):
https://github.com/hashcat/hashcat/blob/...c?raw=true
You can do a basic mask attack like so:
hashcat -a 3 -w 4 -m 6223 --potfile-path=./test.potfile hashcat_sha512_aes-twofish-serpent.tc hashca?l
It sounds like your candidate wordlist will be complex; that will take some additional work (but can be done external to hashcat, as in "script_thing | hashcat -a 0 [...]"
	
 
	
	
~
	
	
 
 
	
	
	
		
	Posts: 2
	Threads: 1
	Joined: Jan 2019
	
	
 
	
	
		 (01-27-2019, 10:30 PM)royce Wrote:  That's hashcat mode 6223 (where 3 = "all" (all three algorithms)):
Code:
  62XY | TrueCrypt                                        | Full-Disk Encryption (FDE)
...
    X  | 2 = PBKDF2-HMAC-SHA512                           | Full-Disk Encryption (FDE)
...
     Y | 3 = XTS 1536 bit all                             | Full-Disk Encryption (FDE)
You can practice and validate your approach against this container with a known password ('hashcat'):
https://github.com/hashcat/hashcat/blob/...c?raw=true
You can do a basic mask attack like so:
hashcat -a 3 -w 4 -m 6223 --potfile-path=./test.potfile hashcat_sha512_aes-twofish-serpent.tc hashca?l
It sounds like your candidate wordlist will be complex; that will take some additional work (but can be done external to hashcat, as in "script_thing | hashcat -a 0 [...]"
Ok,Thanks