Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <840cf31a9cb83672d3745788e8fec847@smtp.hushmail.com>
Date: Sat, 14 Apr 2012 16:27:12 +0200
From: magnum <john.magnum@...hmail.com>
To: john-dev@...ts.openwall.com
Subject: Re: Brute Force TrueCrypt Headers

Thanks! I added this to our wiki wish-list with a link to your mail.

magnum


On 04/14/2012 05:04 AM, Brad Tilley wrote:
> Last year, I wrote a program that demonstrates how to decrypt TrueCrypt
> headers. The code is very basic and straight-forward. It's mostly
> complete, but does not handle a few things such as cascading ciphers and
> keyfiles. However, it will decrypt any newer TrueCrypt header encrypted
> with a single cipher in XTS mode. It also handles normal and hidden
> containers.
> 
> I wanted to share this source code with John Devs as a suggestion to be
> incorporated into jtr. I'm not suggesting that my code be implemented as
> it is intended for explanation/demonstration purposes only and is not
> optimized for password cracking although it can do that albeit slowly. I'm
> only
> suggesting that the ability to brute-force TrueCrypt volume passwords be
> added to jtr.
> 
> Here is my source code: http://16s.us/TCHead/downloads/
> 
> Here is the FAQ: http://16s.us/TCHead/faq/
> 
> I'll be glad to answer questions if there are any, but am unable to
> contribute code other than what I've already written (linked above). Some
> other good source code can be found in TCPlay. It's in DragonFlyBSD (also
> available for Linux) and is probably the most complete implementation of
> TrueCrypt outside of the official TrueCrypt project itself. Solar will
> probably like that source code better than mine and it's a very good
> reference if questions arise on how something works.



Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.