In this video we'll take a look at brute-forcing VeraCrypt's standard encryption mode using hashcat to get the job done.
I caught myself thinking: how long would it actually take to brute-force specific password masks? That’s when I decided to put it to the test using Hashcat and an operating system equipped with a graphics card.
========= Links =========
1) VeraCrypt: https://www.veracrypt.fr/en/Home.html
2) Hashcat: https://hashcat.net/hashcat/
3) DD for Windows: http://www.chrysocome.net/dd
3) Extracting hash: https://hashcat.net/wiki/doku.php?id=...
========= Commands ===========
1) Extract VeraCrypt hash:
dd.exe if=..\encrypted\target of=..\encrypted\target_hash.tc bs=512 count=1
2) Hashcat brute-force command:
hashcat.exe -a 3 -w 1 -m 13721 hash.tc ?d?d?d?d
Blog post: https://codeonby.com/2022/01/19/brute...
Watch video Brute Force VeraCrypt Encryption online, duration hours minute second in high quality that is uploaded to the channel CodeOnBy 18 January 2022. Share the link to the video on social media so that your subscribers and friends will also watch this video. This video clip has been viewed 34,704 times and liked it 406 visitors.