Hi guys,
I have a problem: I can't find out my password for a Veracrypt File Container anymore - Nothing new for you, ok..
So the detailed problem:
I use the latest Veracrypt version (Windows) v1.22 64bit. I created a file container, but I used
First question: Now, do I have to extract the first 512 bytes of the encrypted file container to a seperate file or the first 1024 bytes to get a hash file? I ask this because Veracrypt Twofisch-Serpent mode is "XTS 1024" as hashcat help says.
Second question: Doeas anybody know a Windows software to move the first 512 (or 1024) bytes of a file to a second file?
Last question: As said in this forum earlier, Veracrypt cracking works exactly like Truecrypt cracking... But why is there a Veracrypt checkbox which says "use old Truecrypt mode" (when mounting a file container) if the method is the same?
Thank you very much for your help,
Frank
I have a problem: I can't find out my password for a Veracrypt File Container anymore - Nothing new for you, ok..
So the detailed problem:
I use the latest Veracrypt version (Windows) v1.22 64bit. I created a file container, but I used
- a Password (about 20 chars), consisting of two blocks of numerics and possibly a letter
- a PIM which is definite 710 (I am sure)
- a keyfile, which I know definitvely too
- there is no hidden volume
First question: Now, do I have to extract the first 512 bytes of the encrypted file container to a seperate file or the first 1024 bytes to get a hash file? I ask this because Veracrypt Twofisch-Serpent mode is "XTS 1024" as hashcat help says.
Second question: Doeas anybody know a Windows software to move the first 512 (or 1024) bytes of a file to a second file?
Last question: As said in this forum earlier, Veracrypt cracking works exactly like Truecrypt cracking... But why is there a Veracrypt checkbox which says "use old Truecrypt mode" (when mounting a file container) if the method is the same?
Thank you very much for your help,
Frank