|
Message-ID: <52569.108.15.203.66.1334372642.squirrel@webmail.tuffmail.net> Date: Fri, 13 Apr 2012 23:04:02 -0400 (EDT) From: "Brad Tilley" <brad@...ystems.com> To: john-dev@...ts.openwall.com Subject: Brute Force TrueCrypt Headers Last year, I wrote a program that demonstrates how to decrypt TrueCrypt headers. The code is very basic and straight-forward. It's mostly complete, but does not handle a few things such as cascading ciphers and keyfiles. However, it will decrypt any newer TrueCrypt header encrypted with a single cipher in XTS mode. It also handles normal and hidden containers. I wanted to share this source code with John Devs as a suggestion to be incorporated into jtr. I'm not suggesting that my code be implemented as it is intended for explanation/demonstration purposes only and is not optimized for password cracking although it can do that albeit slowly. I'm only suggesting that the ability to brute-force TrueCrypt volume passwords be added to jtr. Here is my source code: http://16s.us/TCHead/downloads/ Here is the FAQ: http://16s.us/TCHead/faq/ I'll be glad to answer questions if there are any, but am unable to contribute code other than what I've already written (linked above). Some other good source code can be found in TCPlay. It's in DragonFlyBSD (also available for Linux) and is probably the most complete implementation of TrueCrypt outside of the official TrueCrypt project itself. Solar will probably like that source code better than mine and it's a very good reference if questions arise on how something works. Thanks, Brad
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.