Skip to content

Commit 7abcc78

Browse files
authored
Update README.md
1 parent 86834c0 commit 7abcc78

File tree

1 file changed

+11
-11
lines changed

1 file changed

+11
-11
lines changed

README.md

+11-11
Original file line numberDiff line numberDiff line change
@@ -112,7 +112,7 @@ dump.py will perform a hex dump of the decrypted header and first sector of a co
112112
01e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
113113
01f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 55 aa ..............U.
114114

115-
####image.py
115+
###image.py
116116
image is used to image a Truecrypt container for further analysis. The container can be open with a password or with keys extracted from memory.
117117

118118
Encryption modes can be assigned long or short hand where:
@@ -130,33 +130,33 @@ Similarly hash functions can be assigned long or short hand where:
130130
sha-512 = s
131131
whirlpool = w
132132

133-
#####Example usage:
133+
####Example usage:
134134

135135
> image pwd <tc> <image> <mode> <password> [<hash>] [-vbh] [(-f -oBYTES -dBYTES)]
136136
> image key <tc> <image> <mode> [-aKEY -tKEY -sKEY] [(-oBYTES -dBYTES)]
137137

138-
######Scenario 1:
138+
#####Scenario 1:
139139
You wish to image a Truecrypt file "input1.tc" to an image named "output1.dd",
140140
it uses aes and ripemd. The password is "Scenario1". As ripemd is the default
141141
for Truecrypt it does not need to be specified.
142142

143143
> image pwd input1.tc output1.dd aes Scenario1
144144

145-
######Scenario 2:
145+
#####Scenario 2:
146146
You wish to image a Truecrypt file "input2.tc" to an image named "output2.dd",
147147
it uses aes-serpent and sha512. The password is "Scenario2". You wish to save
148148
time and use the short hand commands.
149149

150150
> image pwd input2.tc output2.dd as Scenario2 s
151151

152-
######Scenario 3:
152+
#####Scenario 3:
153153
You wish to image a Truecrypt file "input3.tc" to an image named "output3.dd",
154154
it uses aes-serpent. You know it contains a hidden volume and the password is
155155
"Scenario3".
156156

157157
> image pwd input3.tc output3.dd aes-serpent Scenario3 --hidden
158158

159-
######Scenario 4:
159+
#####Scenario 4:
160160
You wish to image a Truecrypt file "input4.tc" to an image named "output4.dd",
161161
it uses aes. You do not know the password but have extracted AES keys from
162162
memory.
@@ -166,30 +166,30 @@ memory.
166166
feeb4791a0befa4
167167

168168

169-
####pw-check.py
169+
###pw-check.py
170170
pw-check.py is used to check that a small list of passwords work against a container. It checks all options available in Truecrypt and allows you to confirm that normal and backup headers match. The -d option will print the decoded header to screen if successful, the -v option will also read Veracrypt files.
171171

172172
> pw-check <container> <password>
173173
> pw-check example.tc password
174174
password appears to be valid for a Truecrypt standard volume using the normal header using aes and ripemd
175175
password appears to be valid for a Truecrypt standard volume using the backup header using aes and ripemd
176176

177-
####pwcracker.py
177+
###pwcracker.py
178178
pwcracker.py is an example password cracker for Truecrypt. Simply provide a word list and it will attempt to crack the container.
179179

180180
> pwcracker <container> <wordlist>
181181
> pwcracker example.tc wordlist.txt
182182
> PW Found: password
183183

184-
####quick-container.py
184+
###quick-container.py
185185
quick-container.py produces a Truecrypt container quickly by skipping the first stage encryption setting. This is therefore similar to 'quick format' full disk encryption whereby the free space is not first encrypted. This means a hidden volume is very obvious and it's possible to track the ammount of encrypted data stored within a container.
186186

187187
The containers are not formatted and once mounted will require a file system to be created. Containers are always created using AES and ripemd.
188188

189189
> quick-container <container> <password> <mb-size>
190190
> quick-container example password 1024
191191

192-
####reserved.py
192+
###reserved.py
193193
reserved.py uses the free space in the Truecrypt header to hide additional data. This data is encrypted with the same password as the container itself.
194194

195195
To hide a file:
@@ -365,7 +365,7 @@ A CRC32 value for the bytes 64-251 of the header.
365365

366366
**14) Master Keys - 32 Bytes each**
367367

368-
The remaining space is devoted to the master keys. If multiple encryption algorithms are used then multiple keys will be present. Each 'master key' is comprised of 2 separate 128-bit keys for XTS.
368+
The remaining space is devoted to the master keys. If multiple encryption algorithms are used then multiple keys will be present. Each 'master key' is comprised of 2 separate 256-bit keys for XTS.
369369

370370
![Truecrypt Header](https://raw.githubusercontent.com/4144414D/pyTruecrypt/gh-pages/images/header-layout.png)
371371

0 commit comments

Comments
 (0)