Open magnumripper opened 8 years ago
VeraCrypt internal algorithms,
Truecrypt is outdated. Today is popular software Veracrypt. Will there be support for restoring passwords in regular / hidden volumes (with many symmetric encryption algorithms) in the future? In Hashcat, this is implemented and works successfully.
I am also would be glad to see this feature in JtR :)
Meanwhile, can we have VeraCrypt volumes explicitly rejected by our tools? Maybe we should open a separate higher priority issue for that, if it's do-able at all (that is, if they're distinguishable from those we support).
Meanwhile, can we have VeraCrypt volumes explicitly rejected by our tools? Maybe we should open a separate higher priority issue for that, if it's do-able at all (that is, if they're distinguishable from those we support).
LInk to container https://file.io/RkorWvWAQlZs (10Mb)
password 12345
command ./john --wordlist=truecrypt_wordlist2.txt testhashes123.txt
(MacOs Monterey 12.4, John the Ripper 1.9.0-jumbo-1+bleeding-601b61b2d 2022-07-02 12:49:41 +0200 [darwin21.5.0 64-bit arm ASIMD AC])
@alxjzx100 Thanks! Can you possibly create an even smaller container and contribute it via a pull request to https://github.com/openwall/john-samples? We'd appreciate having it in there even if we don't support these yet.
http://www.openwall.com/lists/john-dev/2015/12/31/1
It appears there are some fundamental differences in the forks of TrueCrypt. Specifically VeraCrypt appears to be doing key derivation in a "more secure" fashion than TC or CipherShed. Will the truecrypt2john and the code that cracks those volumes need to be changed?
https://forum.truecrypt.ch/t/veracrypt-or-ciphershed/449/10
Will that spawn a new format/tool, veracrypt2john --format=veracode ? I'll try to add some samples if I have some time today.