

Hashtab 100 password#
The Password "hashcat" is 8 digits, mine was about 18 digits, so it might take 4-5 Next Big Bangs :-). I tried to breakt the sample Hash (TrueCrypt 5.0+ Whirlpool + Twofish-Serpent, PW: hashcat) via Bruteforce but unfortunately it didn't solve it, hashcat told me "Time.Estimated.: Next Big Bang (> 10 years)" and i gave up waiting after 24h as the calculationg time didn't drop below that. (06-18-2020, 12:50 PM)philsmd Wrote: What do you mean by "I'm now able to run the attack" ?Īre you able to crack hashes that you have generated as a test ? Did you try to crack the example hash from ?

Instead of only dictionary attack (without rules) or mask attack ("brute-force") which (the latter) is very difficult to do with slow hash types like TrueCrypt, I would recommend rule based attacks:Ī medium set of good password candidates (just a few thousands or tens/hundred of thousands) with some very well working (efficient in terms of cracking ratio) rules:

if you know the hashing algo for sure, it's even easier to chose). Therefore it's kind of a "catch-all" for a specific hashing variant, if you do not know the bit length (this reduces the possibilities to boot volumes, RIPEMD160 hashing, SHA512 hashing or to the WHIRLPOOL hashing algorithm (3 variants + boot volume, and it's easy to see if an encrypted disk is showing the TrueCrypt boot loader normally. You will see all the TrueCrypt hash types (several variants depending on bit length and hash used + variants for boot volumes)īTW: the 1536 bit can be used to crack 512 bit, 1024 bit and 1536 bit encryption.
