hi there, when the test has was done, it did not create the hash txt files for attacks
---------> BitCracker Hash Extractor <---------
Encrypted device ./imageEncrypted.img opened, size 249999.00 MB
************ Signature #1 found at 0x3 ************
Version: 8
Invalid version, looking for a signature with valid version...
************ Signature #2 found at 0x3f00000 ************
Version: 2 (Windows 7 or later)
=====> VMK entry found at 0x3f00109
VMK encrypted with Startup Key...not supported! (0x3f0012a)
=====> VMK entry found at 0x3f001d9
Encrypted with Recovery Password (0x3f001fa)
Searching for AES-CCM (0x3f00216)...
Offset 0x3f002a9.... found! :)
======== RP VMK #0 ========
RP Salt: b86e8e07abc539fd30a242174542221a
RP Nonce: 50dfd4c09bd1d5010f000000
RP MAC: 3e548eb70d26327d5eaf2f10fa66cae0
RP VMK: b00cf6c7ad8e4625c5fc0fa6b549abd8f2d9984834fd61fec225ecc42ace6e503b34d4f59bf99b27a47fdaf1
************ Signature #3 found at 0x43f00000 ************
Version: 2 (Windows 7 or later)
=====> VMK entry found at 0x43f00109
VMK encrypted with Startup Key...not supported! (0x43f0012a)
=====> VMK entry found at 0x43f001d9
Encrypted with Recovery Password (0x43f001fa)
Searching for AES-CCM (0x43f00216)...
Offset 0x43f002a9.... found! :)
This VMK has been already stored...quitting to avoid infinite loop!
Error creating ./test_hash/hash_recv_pass.txt : No such file or directory
Error while parsing input device image
hi there, when the test has was done, it did not create the hash txt files for attacks