You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
You wish to image a Truecrypt file "input4.tc" to an image named "output4.dd",
161
161
it uses aes. You do not know the password but have extracted AES keys from
162
162
memory.
@@ -166,30 +166,30 @@ memory.
166
166
feeb4791a0befa4
167
167
168
168
169
-
####pw-check.py
169
+
###pw-check.py
170
170
pw-check.py is used to check that a small list of passwords work against a container. It checks all options available in Truecrypt and allows you to confirm that normal and backup headers match. The -d option will print the decoded header to screen if successful, the -v option will also read Veracrypt files.
171
171
172
172
> pw-check <container> <password>
173
173
> pw-check example.tc password
174
174
password appears to be valid for a Truecrypt standard volume using the normal header using aes and ripemd
175
175
password appears to be valid for a Truecrypt standard volume using the backup header using aes and ripemd
176
176
177
-
####pwcracker.py
177
+
###pwcracker.py
178
178
pwcracker.py is an example password cracker for Truecrypt. Simply provide a word list and it will attempt to crack the container.
179
179
180
180
> pwcracker <container> <wordlist>
181
181
> pwcracker example.tc wordlist.txt
182
182
> PW Found: password
183
183
184
-
####quick-container.py
184
+
###quick-container.py
185
185
quick-container.py produces a Truecrypt container quickly by skipping the first stage encryption setting. This is therefore similar to 'quick format' full disk encryption whereby the free space is not first encrypted. This means a hidden volume is very obvious and it's possible to track the ammount of encrypted data stored within a container.
186
186
187
187
The containers are not formatted and once mounted will require a file system to be created. Containers are always created using AES and ripemd.
reserved.py uses the free space in the Truecrypt header to hide additional data. This data is encrypted with the same password as the container itself.
194
194
195
195
To hide a file:
@@ -365,7 +365,7 @@ A CRC32 value for the bytes 64-251 of the header.
365
365
366
366
**14) Master Keys - 32 Bytes each**
367
367
368
-
The remaining space is devoted to the master keys. If multiple encryption algorithms are used then multiple keys will be present. Each 'master key' is comprised of 2 separate 128-bit keys for XTS.
368
+
The remaining space is devoted to the master keys. If multiple encryption algorithms are used then multiple keys will be present. Each 'master key' is comprised of 2 separate 256-bit keys for XTS.
0 commit comments