Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <52569.108.15.203.66.1334372642.squirrel@webmail.tuffmail.net>
Date: Fri, 13 Apr 2012 23:04:02 -0400 (EDT)
From: "Brad Tilley" <brad@...ystems.com>
To: john-dev@...ts.openwall.com
Subject: Brute Force TrueCrypt Headers

Last year, I wrote a program that demonstrates how to decrypt TrueCrypt
headers. The code is very basic and straight-forward. It's mostly
complete, but does not handle a few things such as cascading ciphers and
keyfiles. However, it will decrypt any newer TrueCrypt header encrypted
with a single cipher in XTS mode. It also handles normal and hidden
containers.

I wanted to share this source code with John Devs as a suggestion to be
incorporated into jtr. I'm not suggesting that my code be implemented as
it is intended for explanation/demonstration purposes only and is not
optimized for password cracking although it can do that albeit slowly. I'm
only
suggesting that the ability to brute-force TrueCrypt volume passwords be
added to jtr.

Here is my source code: http://16s.us/TCHead/downloads/

Here is the FAQ: http://16s.us/TCHead/faq/

I'll be glad to answer questions if there are any, but am unable to
contribute code other than what I've already written (linked above). Some
other good source code can be found in TCPlay. It's in DragonFlyBSD (also
available for Linux) and is probably the most complete implementation of
TrueCrypt outside of the official TrueCrypt project itself. Solar will
probably like that source code better than mine and it's a very good
reference if questions arise on how something works.

Thanks,

Brad












Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.