Please note, this is a STATIC archive of website hashcat.net from October 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

hashcat Forum

Full Version: Cracking a Truecrypt Container
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Is it possible to crack the Truecrypt Container password ?

The encryption method was  AES-Twofish-Serpent SHA 512
and the password length was 32 characters with words in different languages, letters, numbers and special characters.
 
Can I recover my password with  hashcat ?
If yes which options do I have to specify?
That's hashcat mode 6223 (where 3 = "all" (all three algorithms)):

Code:
  62XY | TrueCrypt                                        | Full-Disk Encryption (FDE)
...
    X  | 2 = PBKDF2-HMAC-SHA512                           | Full-Disk Encryption (FDE)
...
     Y | 3 = XTS 1536 bit all                             | Full-Disk Encryption (FDE)

You can practice and validate your approach against this container with a known password ('hashcat'):

https://github.com/hashcat/hashcat/blob/...c?raw=true

You can do a basic mask attack like so:

hashcat -a 3 -w 4 -m 6223 --potfile-path=./test.potfile hashcat_sha512_aes-twofish-serpent.tc hashca?l

It sounds like your candidate wordlist will be complex; that will take some additional work (but can be done external to hashcat, as in "script_thing | hashcat -a 0 [...]"
(01-27-2019, 10:30 PM)royce Wrote: [ -> ]That's hashcat mode 6223 (where 3 = "all" (all three algorithms)):

Code:
  62XY | TrueCrypt                                        | Full-Disk Encryption (FDE)
...
    X  | 2 = PBKDF2-HMAC-SHA512                           | Full-Disk Encryption (FDE)
...
     Y | 3 = XTS 1536 bit all                             | Full-Disk Encryption (FDE)

You can practice and validate your approach against this container with a known password ('hashcat'):

https://github.com/hashcat/hashcat/blob/...c?raw=true

You can do a basic mask attack like so:

hashcat -a 3 -w 4 -m 6223 --potfile-path=./test.potfile hashcat_sha512_aes-twofish-serpent.tc hashca?l

It sounds like your candidate wordlist will be complex; that will take some additional work (but can be done external to hashcat, as in "script_thing | hashcat -a 0 [...]"

Ok,Thanks