![]() ![]() Maybe I'll try this for the next run, unfortunately i already tried thousands of passwords and iterations of it via an other tool (OTFBrutus). You would need to come up with a good list of candidate passwords that you use as you dictionary and a couple of rules that mangle the passwords in the dictionary 2.The successful cracking of your TrueCrypt passwordusing TrueCrack.Be sure your screen shot(s) include any commandexecuted and the resulting output in clear /. See and the examples with -a 0 -r from above. if the password was generated randomly (for instance by a password manager) and is known to be random chars. It's a much more clever in most of the cases, except from some minor special cases e.g. I would suggest to use dictionary-based or rule-based attacks with slow hashes like TrueCrypt. (06-18-2020, 12:50 PM)philsmd Wrote: I don't think brute-force is a good strategy here. ![]() The Password "hashcat" is 8 digits, mine was about 18 digits, so it might take 4-5 Next Big Bangs :-). I tried to breakt the sample Hash (TrueCrypt 5.0+ Whirlpool + Twofish-Serpent, PW: hashcat) via Bruteforce but unfortunately it didn't solve it, hashcat told me "Time.Estimated.: Next Big Bang (> 10 years)" and i gave up waiting after 24h as the calculationg time didn't drop below that. (06-18-2020, 12:50 PM)philsmd Wrote: What do you mean by "I'm now able to run the attack" ?Īre you able to crack hashes that you have generated as a test ? Did you try to crack the example hash from ? Instead of only dictionary attack (without rules) or mask attack ("brute-force") which (the latter) is very difficult to do with slow hash types like TrueCrypt, I would recommend rule based attacks:Ī medium set of good password candidates (just a few thousands or tens/hundred of thousands) with some very well working (efficient in terms of cracking ratio) rules: if you know the hashing algo for sure, it's even easier to chose). Therefore it's kind of a "catch-all" for a specific hashing variant, if you do not know the bit length (this reduces the possibilities to boot volumes, RIPEMD160 hashing, SHA512 hashing or to the WHIRLPOOL hashing algorithm (3 variants + boot volume, and it's easy to see if an encrypted disk is showing the TrueCrypt boot loader normally. You will see all the TrueCrypt hash types (several variants depending on bit length and hash used + variants for boot volumes)īTW: the 1536 bit can be used to crack 512 bit, 1024 bit and 1536 bit encryption. ![]()
0 Comments
Leave a Reply. |