|
Message-ID: <840cf31a9cb83672d3745788e8fec847@smtp.hushmail.com> Date: Sat, 14 Apr 2012 16:27:12 +0200 From: magnum <john.magnum@...hmail.com> To: john-dev@...ts.openwall.com Subject: Re: Brute Force TrueCrypt Headers Thanks! I added this to our wiki wish-list with a link to your mail. magnum On 04/14/2012 05:04 AM, Brad Tilley wrote: > Last year, I wrote a program that demonstrates how to decrypt TrueCrypt > headers. The code is very basic and straight-forward. It's mostly > complete, but does not handle a few things such as cascading ciphers and > keyfiles. However, it will decrypt any newer TrueCrypt header encrypted > with a single cipher in XTS mode. It also handles normal and hidden > containers. > > I wanted to share this source code with John Devs as a suggestion to be > incorporated into jtr. I'm not suggesting that my code be implemented as > it is intended for explanation/demonstration purposes only and is not > optimized for password cracking although it can do that albeit slowly. I'm > only > suggesting that the ability to brute-force TrueCrypt volume passwords be > added to jtr. > > Here is my source code: http://16s.us/TCHead/downloads/ > > Here is the FAQ: http://16s.us/TCHead/faq/ > > I'll be glad to answer questions if there are any, but am unable to > contribute code other than what I've already written (linked above). Some > other good source code can be found in TCPlay. It's in DragonFlyBSD (also > available for Linux) and is probably the most complete implementation of > TrueCrypt outside of the official TrueCrypt project itself. Solar will > probably like that source code better than mine and it's a very good > reference if questions arise on how something works.
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.